Posts Tagged ‘attacks’

Super Robot Wars UX: Mazinkaiser SKL – Wingler All Attacks

Taken from NicoVideo Is the turn now from the attacks from Wingler piloted by Tsubasa Yuuki and a little help from the Aira Army’s Psycho Gears From Super Ro…

Related Posts:

Android app learns from your phone to fend off malicious attacks

The last time we heard from Itzhak ‘zuk’ Avraham, he was at Defcon 2011 showing off an Android app that let even inexperienced users poke around networks for weak links and vulnerable computers. Now his company, Zimperium, is rolling out a new mobile …

Related Posts:

Google’s Project Shield helps small websites stand up to DDoS attacks

Yes, it shares the same codename as NVIDIA’s portable Android console, but Google’s Project Shield has nothing to do with gaming — it’s all about helping the little guy. Created in response to a Google Ideas request — a think tank that provides tech solutions for social issues — made by Middle …

Related Posts:

Microsoft’s latest ‘Scroogled’ ad attacks Android with privacy fears

Scroogled_papers_large

Microsoft’s anti-Google campaign is getting a fresh revival this week with a new focus on Google’s Android app store. After directly attacking Gmail and Google Shopping, Microsoft is now attempting to spread fear over Google’s policy of supplying the name, email address, and neighborhood of users who purchase apps on Google Play. In two fresh videos posted to the Scroogled site, Microsoft attempts to convince users to switch to Bing and Windows Phone over Android.

“If you can’t trust their app store, maybe you can’t trust them for anything,” says a narrator in one particular video, suggesting users try Bing. Another focuses on trying to push Windows Phones. The campaign centers on Google’s policy of providing basic information to…

Continue reading…

Related Posts:

Obama will reportedly introduce cybersecurity executive order in wake of recent attacks

President Obama

Bloomberg is reporting that the White House plans to introduce an executive order on cybersecurity sometime after next week’s State of the Union address. The order, which has been in the works for months at this point, would arrive after several high-profile attacks have highlighted the threat posed by online attacks. Just last week, the Wall Street Journal and the New York Times revealed they’d been the victims of attacks — thought to have originated in China — while Twitter announced it could have had as many as 250,000 user accounts compromised.

According to the report, the order will set up a set of voluntary cybersecurity standards that companies operating important US infrastructure will be able to participate in. Federal…

Continue reading…

Related Posts:

Microsoft patches critical Office vulnerability amid ‘limited, targeted’ attacks

activex stock 1020

Microsoft is releasing a security update to patch a critical vulnerability in the ActiveX controls included in all 32-bit versions of Office, among other products. If exploited with a malicious document or webpage, the vulnerability can allow attackers to execute remote code on their targets’ systems, and according to Microsoft, “limited, targeted attacks” using malicious RTF email attachments have been spotted in the wild.

The security update, MS12-027, patches the vulnerability by disabling the ActiveX control in question and swapping it with a new one. It comes at the same time as five other updates, three of which are labeled critical (they could be used to propagate a worm), but due to the documented attacks, MS12-027 is the…

Continue reading…

Related Posts:

Major ISPs agree to FCC’s code of conduct on botnets, DNS attacks

Image
The FCC’s campaign to secure the internet gained new momentum last week, when a group of major ISPs signed on to a new code of conduct aimed at mitigating cybercrime. Adopted by the FCC’s Communications, Security, Reliability and Interoperability Council (CSRIC), the new code targets three main security threats: botnets, DNS attacks and internet route hijacking. The Anti-Bot Code of Conduct invites ISPs to adopt sharper detection methods, and to notify and assist consumers whenever their computers are infected. The DNS code, meanwhile, offers a list of best practices by which ISPs can tighten security. Though it doesn’t call for a full adoption of DNSSEC technology, the guidelines do represent a “first step” toward implementation, allowing web users to verify the authenticity of their online destinations. As for internet route attacks, the CSRIC calls for a similarly collective approach, asking ISPs to collaborate on new technologies within an industry-wide framework.

In a statement, FCC chairman Julius Genachowski said that these practices “identify smart, practical, voluntary solutions that will materially improve the cyber security of commercial networks and bolster the broader endeavors of our federal partners.” The industry apparently agrees, as heavyweights like AT&T, CenturyLink, Comcast, Cox, Sprint, Time Warner Cable, T-Mobile and Verizon have already signed on. For the FCC’s full statement, check out the source link below.

Major ISPs agree to FCC’s code of conduct on botnets, DNS attacks originally appeared on Engadget on Sun, 25 Mar 2012 16:13:00 EDT. Please see our terms for use of feeds.

Permalink ThreatPost  |  sourceFCC (PDF)  | Email this | Comments

Related Posts:

PSA: Google Wallet vulnerable to ‘brute-force’ PIN attacks (video)

Security hounds over at zvelo have discovered a vulnerability in Google Wallet that means your precious PIN can be “easily revealed.” Digging through the app’s code and using Google’s open resources to reveal its contents, they uncovered a piratical treasure trove of data: unique user IDs, Google account information, and the PIN stored as a SHA256 hex-encoded string. Since this string is known to carry four digits, it only takes a “trivial” brute-force attack involving a maximum of 10,000 calculations to decode it. To prove their point, the researchers made a Wallet Cracker app — demoed after the break — that does the job quicker than you can say “unexpected overdraft.”

Google has been receptive to these findings, but its attempts at a fix have so far been hampered by the need to coordinate with the banks, since changing the way the PIN is stored could also change which agency is responsible for its security. In the meantime, zvelo advises that there are some measures users can take themselves, aside from putting a protective hand over their pockets: refrain from rooting your phone, enable your lock screen, disable USB debugging, enable Full Disk Encryption and keep your handset up-to-date.

[Thanks to everyone who sent this in.]

Continue reading PSA: Google Wallet vulnerable to ‘brute-force’ PIN attacks (video)

PSA: Google Wallet vulnerable to ‘brute-force’ PIN attacks (video) originally appeared on Engadget on Thu, 09 Feb 2012 05:07:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourcezvelo  | Email this | Comments

Related Posts:

MARS ATTACKS SUPERFLEX ACTION FIGURE DOOM ROBOT W/ DISK

HEAD CASE BUILDING BLOCK PROTECTIVE SNAP-ON CASE FOR HTC RHYME

$8.45
End Date: Wednesday Apr-23-2014 20:42:52 PDT
Buy It Now for only: $8.45
Buy It Now | Add to watch list

Remote Controlled Battle Drones
$9.99
End Date: Wednesday Apr-23-2014 20:44:16 PDT
Buy It Now for only: $9.99
Buy It Now | Add to watch list

HEAD CASE PILLOW DEATHMATCH SNAP-ON CASE FOR LG OPTIMUS L5 II DUAL E455
$8.45
End Date: Wednesday Apr-23-2014 20:44:33 PDT
Buy It Now for only: $8.45
Buy It Now | Add to watch list

Incoming search terms:

Related Posts:

MARS ATTACKS SUPERFLEX ACTION FIGURE DOOM ROBOT W/ DISK

HEAD CASE BUILDING BLOCK PROTECTIVE SNAP-ON CASE FOR HTC RHYME

$8.45
End Date: Wednesday Apr-23-2014 20:42:52 PDT
Buy It Now for only: $8.45
Buy It Now | Add to watch list

Remote Controlled Battle Drones
$9.99
End Date: Wednesday Apr-23-2014 20:44:16 PDT
Buy It Now for only: $9.99
Buy It Now | Add to watch list

HEAD CASE PILLOW DEATHMATCH SNAP-ON CASE FOR LG OPTIMUS L5 II DUAL E455
$8.45
End Date: Wednesday Apr-23-2014 20:44:33 PDT
Buy It Now for only: $8.45
Buy It Now | Add to watch list

Related Posts:

Featured Products

Archive
Gruvisoft Donations