Post author:Paolo Passeri Post published:April 2, 2013 Post category:Cyber Attacks Timelines / Security Post comments:0 Comments Reading time:7 mins read First part here: 1-15 March 2013 Cyber Attacks Timeline March is gone and hence it is time to analyze the events that characterized the past month. Two events in particular gained the first pages of the magazines: the wiper malware in Korea and t
A hacker, or hackers, purporting to be part of the Anonymous group claim to have got their hands on more than 15,000 passwords belonging to users of Uriminzokkiri.com, one of North Korea’s primary sites on the Internet. An anonymously written note — first spotted by the North Korea Tech blog — makes the claim, and discloses what are said to be six sample user records for the site, which is run out
The virtual currency Bitcoin isn’t backed by any assets or central authority. It’s only three years old and its exact origin is a mystery. And yet, for some reason, tens of thousands of people have determined that a single Bitcoin — essentially a unique sequence of letters and numbers — hit $105 US dollars earlier today, the most in its short history. At a time when the euro seems increasingly uns
This post has been updated (18 April 2013). Key Findings A compromised version of Kakao Talk, an Android-based mobile messaging client, was sent in a highly-targeted email to a prominent individual in the Tibetan community. This email message repurposed a legitimate private email message sent by an information security expert in the Tibetan community to a member of the Tibetan parliament-in-exile.
A report released Monday by the Citizen Lab, a group of information security researchers at the Munk School of Global Affairs at the University of Toronto, shows that Tibetan activists are being targeted with sophisticated malware designed to infect Android phones, allowing the malware's operator to steal the user's contacts and messages, and track his or her location. Highly-targeted malware for
Summary Last December, our senior malware researcher (Mr. Abhishek Singh) posted an article about a Trojan which could detect mouse clicks to evade sandbox analysis. Interestingly, we have found another spear phishing document that downloads malware which incorporates improved mouse click detection anti-sandboxing capability. It also leverages multiple advanced evasion techniques to achieve stealt
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く