+

Tagged With / 'criminals'

December 8, 2011


Brazilian banking Trojan disguised as Microsoft anti-virus software

A Trojan (identified as Trojan-Downloader.Win32.VB.aoff) is targeting Windows-based systems by removing built-in AV software and clearing a path for cybercriminals to silently steal online banking credentials. The Trojan affects ‘ntldr’ the default boot loader in Windows.The Trojan is propagating as an attachment on an email. This attack vector relies on the victim clicking on the […]

Read more

December 7, 2011

Hakin9 Mobile Cover

Hakin9 Mobile 1/11 (1)

Android Insecurities by Joey Peloquin The article will begin with a focus on what the author calls Offensive Mobile Forensics, an analysis technique that mimics the approach an attacker would take in the event they acquired a lost or stolen device. Readers will notice some stark differences between iOS and Android analysis. Next, the author […]

Read more

November 10, 2011

pic

Machine Learning Forensics for Law Enforcement, Security, and Intelligence

ISBN: 978-1439860694 RRP: $69.95 The first time that I quickly browsed through this book, I thought that maybe I was reading this in a slightly different language as there were new acronyms and different ways of thinking on how to process information for me to learn By the time I was finished my head was […]

Read more

October 17, 2011

Hakin9 Botnet

Hakin9 Extra – Botnet 05/2011

A study of a Botnet creation process and the impact of a DDoS attack against a web server by Stavros N. Shaeles and Ioannis D. Psaroudakis Over the following paragraphs we are going to describe in steps, the procedure of setting up a botnet in order to execute our DDoS attack. The purpose of building […]

Read more

September 21, 2011


The Facebook friend request data mining plug-in

A new cross platform Java Facebook proof of concept (PoC) hacking plug-in data mining tool could turn your closest friends into your worst enemies – social engineering anyone? The plug-in tool (created by a team at RISST), called “Facebook Pwn“, lets Facebook criminals (and normal users like us) — steal personal profile information from any […]

Read more

September 15, 2011

Android

Hakin9 Extra – Android Security

Mobile Malware Analysis by Cory Adams With the emergence of the Android OS into the mobile market, nation state hackers and criminals alike are actively conducting attacks against the OS and its users for information gathering and financial gain. A high reward tool in an attacker’s arsenal is malicious software or malware, which allows information […]

Read more

August 25, 2011


The DDOS, a New „Old” Type of Attack!

In this article, Orlando presents the DDoS attack structure and the Botnet structure . He will explore DDoS attack, the Botnet prevention and the DoS defense systems. He discovers what the mainly motivations pushing hackers to commit criminals act with Botnets and DoS is. You will learn what the DDoS attack structure is and how […]

Read more

August 25, 2011


Java Script Botnets – Implementation of Browser-based Malware and DDOS Attacks

Most of the botnets currently used by cybercriminals are imple mented in traditional languages such as C++. More recent example are written in Java, achieving some degree of portability but the basically share the same limitations. All these botnet creators fac the same problems, first they need to create a Command & Contro center, to […]

Read more

August 23, 2011

DDOS Attacks

Hakin9 StarterKit 2/2011 – DDOS Attacks

The DDOS, a New „Old” Type of Attack! by Orlando Pivi In this article, Orlando presents the DDoS attack structure and the Botnet structure . He will explore DDoS attack, the Botnet prevention and the DoS defense systems. He discovers what the mainly motivations pushing hackers to commit criminals act with Botnets and DoS is. […]

Read more

July 1, 2011

9781597496377

Cyber Warfare

Cyber Warfare By Jason Andress, Steve Winterfeld Publisher: Syngress June U.S. 2011,  July EMEA www.syngress.com Description Cyber Warfare explores the battlefields, participants and the tools and techniques used during today’s digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts […]

Read more

May 12, 2011

News Carlos A. Ayala Comments Off
hakin9_news

Canada Becomes Second-Largest Malware Source

Cyber-criminals appear to be on the move, switching from Chinese and Eastern European IP addresses in favour of Canadian ones, according to security researchers. In contrast, Canada has a better “cyber-reputation” and traffic from those servers may be regarded with less suspicion. More malicious content is being hosted in Canada than ever. The number of […]

Read more

May 12, 2011

News Carlos A. Ayala Comments Off

Zeus Source Code Leaked

The source code to the infamous Zeus crimeware kit, which has been sold on underground forums for years, has been leaked and is now available for anyone to see if they know where to look. Security researchers over the weekend noticed that files that appeared to contain the source code for the Zeus crimeware kit […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa