Eric Gearhart Virtual Threat Contributing Writer In this “Virtual Threat” how-to article, I’ll discuss the ins and outs of setting up a Dionaea honeypot. For those unfamiliar with the term, a honeypot at its core is a “computer system expressly set up to attract and ‘trap’ people who attempt …
Read More »Social Engineering as a Technical Tool
Chris Hadnagy EthicalHacker When we speak about social engineering the normal conversation steers away from the technical and more to the psychological. This month we are going to change it up a bit and steer head on into the technical arena for a discussion about penetration testing. There seems …
Read More »Five Week Financial Cyber Attack Against Largest US Banks Continues
Chris Dougherty VirtualThreat Contributing Writer For five weeks now some of the largest banks in the United States, including HSBC, Capitol One and BB&T, have been under a sustained cyber attack from unidentified hackers. The attackers are using denial of service (DOS) attacks to cripple access to the banks’ …
Read More »Be Warned: Your Computer May Be Stealing Your Money
Jerome Taylor The Independent Stealing your money? Cyber-security experts sound alarm over growing prevalence of sophisticated malware. Almost a third of all fraudulent banking transactions now originate from the customer’s own computer, as cyber criminals use increasingly sophisticated malware to hijack accounts, online security specialists warned yesterday. To combat …
Read More »Hackers May Be Able To Manipulate Election Results
Ericka Chickowski DarkReading Hackers May Be Able To Manipulate Election Results. As the rest of the nation’s citizens sit on on pins and needles about who will win the presidential election — Barack Obama or Mitt Romney — information security pros are even more anxious in their wait to …
Read More »Hacked Pacemaker Used For Anonymous Assassination
Jeremy Kirk ComputerWorld IDG News Service – A hacked pacemaker or implantable cardioverter-defibrillator could be manipulated for an anonymous assassination. Pacemakers from several manufacturers can be commanded to deliver a deadly, 830-volt shock from someone on a laptop up to 50 feet away, the result of poor software programming …
Read More »Hacked Iranian Nuclear Plants Play Heavy Metal Music by AC/DC
Chris Dougherty VirtualThreat Contributing Writer Hacked Iranian Nuclear Plants Play Heavy Metal Music by AC/DC. It seems the Iranian government has been busy retaliating after a barrage of recent cyber attacks targeting the computers within the country’s nuclear program. First there was Stuxnet, a malicious piece of malware that …
Read More »6 Real Hacker Attacks Straight Out of the Movies
Danny Vittore Cracked.com Hacker attacks: Hollywood thinks that computers run on black magic and hackers are wizards. In movies, computers can blow up houses, shut down highways, release plagues and make Matthew Lillard appealing to women. However, our collective groaning about how laughably unrealistic these movies are may have been …
Read More »Iran Cyberattacks Target Persian Gulf Gas and Oil Companies
CBS News Iran Cyberattacks Target Persian Gulf . A former U.S. government official says American authorities firmly believe that Iranian hackers, likely supported by the Tehran government, were responsible for recent cyberattacks against oil and gas companies in the Persian Gulf and that they appeared to be in retaliation for …
Read More »Twitter Hacking Victims Find Their Accounts On Black Market
Gerry Smith Huffington Post Eric Weaver tried logging in to his Twitter account this summer, but he was locked out. A hacker had broken into his account and changed the password. But it didn’t end there. With a little digging, Weaver found that his Twitter handle — @weave …
Read More »