Subscribe to Malware Help RSS Feed RSS Feed - Subscribe to Malware Help. Org on Twitter Follow on Twitter - Malware Help YouTube Channel YouTube Channel - Subscribe to Malware Help by Email Subscribe by Email

Hacking

How Hackers Snatch Real-Time Security ID Numbers

by Shanmuga

"The world’s savviest hackers are on to the “real-time Web” and using it to devilish effect. The real-time Web is the fire hose of information coming from services like Twitter. The latest generation of Trojans — nasty little programs that hacking gangs use to burrow onto your computer — sends a Twitter-like stream of updates […]

Read the full article →

Tenuous trail leads from GhostNet to hacker

by Shanmuga

"A telltale e-mail address in the GhostNet report led two researchers to the online home of a seemingly low-level Chinese hacker, according to an analysis posted on Thursday, but an author of the original report stressed that the cyber criminal is likely only related to a lesser piece of malware.

Read the full article →

Hacking iTunes Gift Cards, and an iTunes Update

by Shanmuga

"Recently, several media outlets have been running a fascinating story about hackers making oodles of money selling iTunes gift cards activation codes at online auctions, supposedly after cracking the secret algorithm Apple uses to generate voucher codes for iTunes gift cards.

Read the full article →

Hackers continue to abuse search engine results

by Shanmuga

"Cyber-criminals are always on the lookout for new tricks, but they are also sticking with an oldie-but-goodie—abusing search engine results. According to security pros, there has been a significant increase in the tactic since January. On March 10, officials at Symantec noted attackers were using sponsored search results on Yahoo to lure Web surfers to […]

Read the full article →

Russian Hacker leaves message for Microsoft in Trojan code

by Shanmuga

"Here’s a new way to get Microsoft to pay attention to you: Slip a brief message into the malicious Trojan horse program you just wrote. That’s what an unnamed Russian hacker did recently with a variation of Win32/Zlob, a Trojan program victims are being tricked into installing on their computers.

Read the full article →

Thousands of Websites Hacked

by Shanmuga

Security vendor Kaspersky Labs warns that ""We’re estimating that in the last two days alone, between 2,000 and 10,000 servers, mainly Western European and American ones, have been hacked," Kaspersky wrote on its Web site Friday, "It’s not yet clear who’s doing this."

Read the full article →

RAM raiders: inside secrets of the cyber hackers

by Shanmuga

"I have just found a new best friend and his name is Pyr0. I didn’t choose him because he is entertaining or fun to be with – although he is both. Nope, it’s just that, more than anything, you wouldn’t want Pyr0 to be your enemy.

Read the full article →

Hacking: iGoogle gadgets a security risk, say hackers

by Shanmuga

"HACKERS turned computer security specialists have accused Google of setting users up for online disasters by letting them personalise their home pages with applications that could be tainted. Software that people can be tricked into installing on iGoogle homepages can track their activities and even be used to control their computer, SecTheory chief executive Robert […]

Read the full article →

Hacking: Hackers recently Used Facebook for Malware Attack

by Shanmuga

"Hackers, impersonating members’ friends, attacked Facebook by convincing users on Facebook’s Wall to view a video link that they said was hosted by Google. The Wall is a place were members post messages for friends.

Read the full article →

Hacking: Ongoing IFrame attack proving difficult to kill

by Shanmuga

"One of the factors that make an ongoing malware attack so difficult to stop is the speed with which the assault can evolve. Over the past 12 days, an IFrame injection attack that originally focused on ZDNet Asia has been spreading across the ‘Net, changing targets and payloads on an almost daily basis. An iFrame […]

Read the full article →

Hacking: Second mass hack exposed

by Shanmuga

"Researchers at McAfee estimated that the attack has been active for roughly one week, and in that time frame has managed to place itself on roughly 200,000 web pages.

Read the full article →

Hacking: Trend Micro Details Its Recent Failed Web Attack

by Shanmuga

"The code inserted in some Web pages of the site was meant to redirect the visitor to a malicious server that would download malware capable of stealing passwords on an infected computer, Trend Micro spokesman Michael Sweeny said. The attempt, however, failed.

Read the full article →

Hacking: Cyber-attack launched from 10,000 web pages

by Shanmuga

"The web pages have been modified to silently redirect visitors to sites laden with malware that attempt to break into the user’s PC. McAfee Avert Labs described the assault as "one of the largest attacks to date of this kind".

Read the full article →

Goolag Scanner brings Google hacking to the masses

by Shanmuga

"An infamous hacking group called Cult of the Dead Cow (cDc) recently released a tool called Goolag Scanner, which simplifies and automates Google hacking.

Read the full article →

Hacked: Researchers figure out how to crack GSM phone security

by Shanmuga

"Two enterprising researchers claim to have figured out a way to eavesdrop on calls made using GSM mobile phones, cracking open its much-vaunted encryption.

Read the full article →

A History of Hacking Culture

by Shanmuga

"The appearance of professional Internet criminals was predicted in fiction long before the Internet became a mass medium. During the early years of the Web, we spent a great deal of time and energy looking for ways to defeat the professional thief. The mischief maker, the prankster, and the juvenile delinquent were overlooked. Then a […]

Read the full article →

Hacking: DoS attack prevents access to WordPress.com blogs

by Shanmuga

"The WordPress.com blog-hosting service suffered a DoS (denial-of-service) attack that began Saturday and was still preventing users from logging in or posting to their blogs on Tuesday.

Read the full article →

Malware: Russian hosting network running a protection racket

by Shanmuga

"The Russian Business Network, a notorious hacker and malware hosting network, runs a protection racket that extorts as much as $2,000 a month in fees for "protective Web services" from borderline sites, a researcher alleged today.

Read the full article →

Hackers turn to drive-by downloads

by Shanmuga

"Organised criminal hackers are waging a highly sophisticated war by exploiting vulnerabilities in end users’ web browsers using drive-by downloads, security experts warn.

Read the full article →

Hacking: Vista’s Growing Popularity Draws Hackers’ Malice

by Shanmuga

"With more people finally switching to Windows Vista, the operating system is fast becoming a target for security researchers and–surprise!–hackers.

Read the full article →

Hacking: Attackers Abuse Google Blogger

by Shanmuga

"Hackers are currently littering Google’s Blogger site with phony blogs — some containing malware, pornographic images, or pure spam. "Google Blogger is being used as a malware delivery mechanism," says Ken Steinberg, CTO and president of Savant Protection, who discovered the attack while working on his own blog this morning. The attackers apparently are automatically […]

Read the full article →

Hacking: 51 Percent Of Malicious Web Sites Are Hacked

by Shanmuga

"The number of legitimate Web sites that have been hacked and seeded with code that tries to infect the visitor’s PC with malware now exceeds the number of sites specifically created by cyber criminals, according to a report released today.

Read the full article →

Tips: How to Minimize Risk from Zero Day Attacks

by Shanmuga

"…Microsoft Excel files are being used to exploit a zero-day (previously unknown/unpatched) vulnerability and plant keystroke loggers on select (.gov?) networks…bugs in Microsoft Office applications emerged over the last year as standard weapons for criminals conducting corporate espionage and computer attacks against military targets. Last summer, Microsoft’s Office team struggled to keep pace with flaw […]

Read the full article →