Tag Archives: hackers

Spear Phishing

Cyber thieves stole nearly $215 million from businesses in the last 14 months using email scams. Once a high level exec has his or her email compromised, the bad guys lurk, learn the schedules, learn the business, learn the business … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Spear Phishing

Under 11 Minutes to Crack WiFi for 7 Year Old

Seven-year-old Betsy Davis, using only youtube videos for knowledge, was able to find out how to hack the controlled environment’s public WiFi. She set up a rogue access point for a Man-in-the-Middle (MitM) attack, which allowed her to steal data … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Under 11 Minutes to Crack WiFi for 7 Year Old

770,000 Records From One of Australia’s Largest Travel Insurance Companies

Around the number of 770,000 records of personal information consisting of travel insurance clients, names, phone numbers, email addresses, travel dates and prices for policies was stolen around December 18th. Aussie Travel Cover notified 3rd party agents, but did not … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on 770,000 Records From One of Australia’s Largest Travel Insurance Companies

Hacker’s List

A new service is online where a person posts a problem to solve as a job and another person bids on the work if they know how to solve it. So far, most problems look to be in regards to: … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on Hacker’s List

Blackhat Behind the Scenes Movie Trailer

Back in September, I wrote about Thor being a black hat hacker. Here is the behind the scenes extended trailer. The trailer seems pretty good with some research on the back end. I hope the actual movie is good! Post … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Blackhat Behind the Scenes Movie Trailer

Stealing Biometrics & Bypassing Authentication

Using today’s common high resolution smart phones, it’s possible to remotely enable a camera, and pull someone’s PIN in the reflection of their screen off the user’s eye! This is one of the reasons we shouldn’t install apps, like the … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Stealing Biometrics & Bypassing Authentication

Anunak, Russian/Ukraine Bank Hackers

An ATM gang has stolen more than $15 million from Eastern European banks, To gain a foothold inside financial institutions, the “Anunak group” — sent bank employees targeted, malware-laced emails made to look like the missives were sent by Russian … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Anunak, Russian/Ukraine Bank Hackers

20 Bucks Buys You 1,000 Node Bot Army

According to the Dell SecureWorks report, for $20 you can purchase a small bot army of 1,000 computers. Findings in the deep web also include that the there is excellent customer service! Master those basics people and you will gain … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on 20 Bucks Buys You 1,000 Node Bot Army

Iran vs. Las Vegas Sands

You may have heard that Las Vegas Sands was hacked recently, but it happened nearly a year ago on February 10th of 2014. PCs and Servers were getting shut down and their hard drives started to erase. The phone lines … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Iran vs. Las Vegas Sands

Hey Bebe!

According to an article written by Brian Krebs, it sounds like Bebe is undergoing a credit/debit breach investigation. The data copied from the magnetic stripe on the backs of credit cards, which bad-guys can use to write to blank cards … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Hey Bebe!