Anonymous Hactivists Plan Wikileaks Clone Called TYLER

Anonymous Hactivists Plan Wikileaks Clone Called TYLER

Chris Dougherty VirtualThreat Contributing Writer   A member of the Anonym0us hacking collective announced the group is planning to set up an enhanced Wikileaks clone service by the end of 2012. According to The Hacker News, the Wikileaks competitor is scheduled to be launched on December 21st of this year.  A representative for the hacktivist group, claiming to speak on behalf of …

Read More »

FBI Working 24/7 Tracking Hackers and Cyber Attacks

FBI Working 24/7 Tracking Hackers and Cyber Attacks

Emil Protalinski TheNextWeb   The Federal Bureau of Investigation (FBI) is finally stepping up its game when it comes to tracking hackers. Maybe it was Anonymous that did it or maybe it was statements from the US Secretary of Defense two weeks ago, but either way, the FBI is now hunting hackers 24/7. You’re not the only one who was under the impression that the …

Read More »

Top 25 Most Common Passwords List for 2012

Top 25 Most Common Passwords List for 2012

Chris Dougherty VirtualThreat Contributing Writer   Have you ever wondered why so many people are easy targets for hackers?  The top reason is due to the use of weak, common passwords. According to SplashData, a California password management company, the word ‘password’ is the #1 most common password on the “Worst Passwords of 2012” list. The #2 position for most …

Read More »

The Jester’s OSINT Tools Include Maltego Creepy and Spokeo

The Jester's OSINT Tools Include Maltego Creepy and Spokeo

  Infosecurity Magazine   Jester (th3j35t3r) describes himself as a patriotic cyber activist. He spends his time trying to find and take down what he considers to be enemies of the USA, ranging from Wikileaks and Anonymous to militant Islamic websites. Jester’s identity is not publicly known. Many suspect that he works with law enforcement, but outside of the law …

Read More »

How-To: Dionaea Honeypot Installation on Joyent Cloud VM

Dionaea Honeypot

Eric Gearhart Virtual Threat Contributing Writer   In this “Virtual Threat” how-to article, I’ll discuss the ins and outs of setting up a Dionaea honeypot. For those unfamiliar with the term, a honeypot at its core is a “computer system expressly set up to attract and ‘trap’ people who attempt to penetrate other people’s computer systems.” A boatload of pre-built …

Read More »

Social Engineering as a Technical Tool

Social Engineering as a Technical Tool

Chris Hadnagy EthicalHacker   When we speak about social engineering the normal conversation steers away from the technical and more to the psychological.  This month we are going to change it up a bit and steer head on into the technical arena for a discussion about penetration testing. There seems to always be a debate online about pentesting, what it …

Read More »

Five Week Financial Cyber Attack Against Largest US Banks Continues

Five Week Cyber Attack Against Largest US Banks Continues

Chris Dougherty VirtualThreat Contributing Writer   For five weeks now some of the largest banks in the United States, including HSBC, Capitol One and BB&T, have been under a sustained cyber attack from unidentified hackers. The attackers are using denial of service (DOS) attacks to cripple access to the banks’ websites.  In a phone interview with Bloomberg yesterday Carl Herberger, V.P. …

Read More »

Be Warned: Your Computer May Be Stealing Your Money

Be Warned: Your Computer May Be Stealing Your Money

Jerome Taylor The Independent   Stealing your money? Cyber-security experts sound alarm over growing prevalence of sophisticated malware. Almost a third of all fraudulent banking transactions now originate from the customer’s own computer, as cyber criminals use increasingly sophisticated malware to hijack accounts, online security specialists warned yesterday. To combat the ever-present threat of online crime, financial institutions across Europe …

Read More »

Hackers May Be Able To Manipulate Election Results

Hackers May Be Able To Manipulate Election Results

Ericka Chickowski DarkReading   Hackers May Be Able To Manipulate Election Results.  As the rest of the nation’s citizens sit on on pins and needles about who will win the presidential election — Barack Obama or Mitt Romney — information security pros are even more anxious in their wait to see whether this is the year that hackers find a …

Read More »

Hacked Pacemaker Used For Anonymous Assassination

Hacked Pacemaker Used For Anonymous Assassination

Jeremy Kirk ComputerWorld   IDG News Service –  A hacked pacemaker or implantable cardioverter-defibrillator could be manipulated for an anonymous assassination.  Pacemakers from several manufacturers can be commanded to deliver a deadly, 830-volt shock from someone on a laptop up to 50 feet away, the result of poor software programming by medical device companies. The new research comes from Barnaby …

Read More »