Quantcast

Archive: Aug 2013

From Russia with Love.exe – The Russian Underground Hacking Culture

While participating in HITBSecConf Malaysia, security analysts The Grugq and Fyodor Yarochkin present their study of the ins and outs of the Russian hacking community, hacking forums and culture. The Grugq: Hi everyone. This is Fyodor, I’m Grugq by the way. What this talk is on is it’s basically on the...

HitmanPro 3 review

$24.95 SurfRight HitmanPro 3 is a splendid malware cleanup utility that works where others may fail. Usability:  Features:  Efficiency:  Support:  Overall:  Download The seeming unpretentiousness that the Netherlands-based SurfRight software house made their famous HitmanPro...

The Anatomy of Social Engineering 5: The Reality and Defenses

This entry encompasses the summary of how effectively social engineering exploits the quirks, or flaws, of the human brain, and provides some defense advice. So, in reality these are just tricks that statistically increase the odds of compliance (see right-hand image). And they’re obviously not going to...

The Anatomy of Social Engineering 4: Social Proof, Liking, Authority and Scarcity Flaws

The article continues to describe psychological quirks of the human brain, now focusing on four more flaws that tend to spontaneously affect one’s behavior. 3. Social Proof The next flaw that our brains have is that we try to do and think what other people who seem like us do and think (see right-hand...

FBI MoneyPak Virus: “Your computer has been locked by the FBI”

An aggressive ransomware campaign involving the so-called FBI MoneyPak virus (Reveton Trojan, Citadel, Trojan.Ransomlock.R) has been reportedly hitting computer users since 2012 and still appears to stick to a steady propagation pattern despite considerable international law enforcement effort to cease the...

Remove FBI MoneyPak Virus if Safe Mode Doesn’t Work

Cyber criminals are constantly improving and refining their virus code; recent versions of this Trojan block Windows Safe Mode functions described in our previous post. In the article that follows we will show how to remove the FBI ransomware with the help of SurfRight HitmanPro. This instruction addresses...

The Anatomy of Social Engineering 3: Reciprocity and Consistency Quirks

This section covers some of the natural human quirks, namely reciprocity and consistency, and highlights how those can be used for social engineering. There have been other studies to find out quirks of the human brain, other than the magic word “because”. These 6 quirks I’m going to talk about...

The Anatomy of Social Engineering 2: Evolutionary Triggers

The key subject matter here is how exploiting evolutionary aspects naturally affects humans in terms of manipulative influence and social engineering proper. Ties to Evolution So, let’s talk about social engineering and exploiting the human’s mind, because there’re vulnerabilities in a human mind that...

The Anatomy of Social Engineering

Reflected herein is a study by the Florida State University researchers pertaining to the analysis of social engineering from a psychological perspective. We’re going to talk about social engineering, and perhaps how you can use it to have more fun next week, if you’re not stuck doing work all the time. ...

The Modern History of Cyber Warfare 9: Cybersecurity Hurdles

The lecture wraps up with an overview of the principal policy hurdles for the West in terms of implementing proper cybersecurity now and in the future. Now I will go over, basically, the policy hurdles that the West faces (see right-hand image), specifically this country, the United States. This portion of...

The Modern History of Cyber Warfare 8: A History of Legislature Failure

This part encompasses a retrospective review of US laws and acts as well as pros and cons of current legislative proposals on the surveillance of cyberspace. So, let’s talk about US legislature in this area, or what I subtitled as “a history of failure” (see right-hand image). In the 1980s...

The Modern History of Cyber Warfare 7: Legislation and Policies

Coverage of the existing legislation addressing cybercrime, as well as cooperation of private sector and government in this realm, are reflected in this entry. So, how do we begin making policies and laws with all this uncertainty? It’s really a problem that I’m glad I don’t have to fix. However,...

The Modern History of Cyber Warfare 6: Possible Cyber War Scenario

What gets overviewed herein is the modeling of a cyber war if it were to break out, and the various nuances of attacker attribution in the present-day world. So here’s what the common perception of what a cyber war would look like. There will be, basically, targeted efforts and pervasive cultural efforts...

The Modern History of Cyber Warfare 5: The Internet of Things

The lecturer now outlines the hazards associated with billions of things being connected to the Internet and highlights nation state cyber warfare goals. As we’re approaching billions and billions of things connected to the Internet, imagine supply chain attacks for what we are calling the Internet of...

The Modern History of Cyber Warfare 4: 0day Black Market and State Sponsored Attacks

This entry covers the issue of 0day exploits being discovered and unethically used by some companies to gain profit, and touches upon state sponsored attacks. We are basically kind of in the middle of a cyber cold war, and the evidence is kind of staring right at us. So let’s talk about, basically, the...

The Modern History of Cyber Warfare 3: Ongoing Debate on APTs

This section touches upon the tangible consequences of advanced persistent threats being utilized and the debate concerning the acceptable extent of that. While we’re talking about groups of hackers, let’s just dive into the deep end of it: advanced persistent threats, and talk about the small history...

The Modern History of Cyber Warfare 2: Hacker Culture in the Western and Eastern World

The “Offensive Security” lecture at FSU continues with extensive analysis of advanced persistent threats of the last several years and an overview of hacker culture differences globally. So, while we were still in 2010, in June Stuxnet was discovered; at least Stuxnet v.1.01.1, and everyone in...

The Modern History of Cyber Warfare

This article reflects the lecture for CIS5930/CIS4930 “Offensive Security” at the Florida State University, covering some of the events that compose the history of what’s called “cyber warfare”. Today’s lecture is about that term: cyber warfare, the history of it, the public...

The Lifecycle of Cybercrime 5: Public-Private Partnerships as a Countermeasure

Now Erik Rasmussen takes some time to talk about the US Secret Service’s achievements and the role of public-private partnerships in fighting cybercrime. Nicholas Percoco: Now I’d like to have you spend a couple of minutes talking about some of the successes your organization has had. We spoke a lot...

The Lifecycle of Cybercrime 4: Perspective of the Secret Service

Now Nicholas Percoco invites Erik Rasmussen from the US Secret Service to join the discussion of cybercrime and answer questions from the community. Nicholas Percoco: So, now what we’re going to do is we’re going to bring out a special guest, somebody I’ve been working with for a long period of time,...

The Lifecycle of Cybercrime 3: Demos of Exploit-Based Data Theft

In this part of the keynote Nicholas Percoco demonstrates the flow of a typical personal data harvesting attack based on the use of common exploits. Now what I want to do is change gears a little bit. We talked about the major methods of attack, and so I want to share with you a little bit of an attack demo....