criminals

Brazilian banking Trojan disguised as Microsoft anti-virus software

A Trojan (identified as Trojan-Downloader.Win32.VB.aoff) is targeting Windows-based systems by removing built-in AV software and clearing a path for cybercriminals to silently steal online banking credentials. The Trojan affects ‘ntldr’ the default boot loader in Windows.The Trojan is propagating as…

Hakin9 Mobile Cover

Hakin9 Mobile 1/11 (1)

Android Insecurities by Joey Peloquin The article will begin with a focus on what the author calls Offensive Mobile Forensics, an analysis technique that mimics the approach an attacker would take in the event they acquired a lost or stolen…

Hakin9 Botnet

Hakin9 Extra – Botnet 05/2011

A study of a Botnet creation process and the impact of a DDoS attack against a web server by Stavros N. Shaeles and Ioannis D. Psaroudakis Over the following paragraphs we are going to describe in steps, the procedure of…

The Facebook friend request data mining plug-in

A new cross platform Java Facebook proof of concept (PoC) hacking plug-in data mining tool could turn your closest friends into your worst enemies – social engineering anyone? The plug-in tool (created by a team at RISST), called “Facebook Pwn“,…

Android

Hakin9 Extra – Android Security

Mobile Malware Analysis by Cory Adams With the emergence of the Android OS into the mobile market, nation state hackers and criminals alike are actively conducting attacks against the OS and its users for information gathering and financial gain. A…

The DDOS, a New „Old” Type of Attack!

In this article, Orlando presents the DDoS attack structure and the Botnet structure . He will explore DDoS attack, the Botnet prevention and the DoS defense systems. He discovers what the mainly motivations pushing hackers to commit criminals act with…

DDOS Attacks

Hakin9 StarterKit 2/2011 – DDOS Attacks

The DDOS, a New „Old” Type of Attack! by Orlando Pivi In this article, Orlando presents the DDoS attack structure and the Botnet structure . He will explore DDoS attack, the Botnet prevention and the DoS defense systems. He discovers…

9781597496377

Cyber Warfare

Cyber Warfare By Jason Andress, Steve Winterfeld Publisher: Syngress June U.S. 2011,  July EMEA www.syngress.com Description Cyber Warfare explores the battlefields, participants and the tools and techniques used during today’s digital conflicts. The concepts discussed in this book will give…

hakin9_news

Canada Becomes Second-Largest Malware Source

Cyber-criminals appear to be on the move, switching from Chinese and Eastern European IP addresses in favour of Canadian ones, according to security researchers. In contrast, Canada has a better “cyber-reputation” and traffic from those servers may be regarded with…

Zeus Source Code Leaked

The source code to the infamous Zeus crimeware kit, which has been sold on underground forums for years, has been leaked and is now available for anyone to see if they know where to look. Security researchers over the weekend…