Quantcast

Author: david b.

What to do if your Facebook account gets hacked?

The ‘WHO Radio’ Wise Guys Brian Gongol and Dan Adams are discussing the Facebook account hack issue to help you in case you find out that your Facebook account has gotten compromised, providing specific tips to take care of this breach and prevent it from happening in the future. So how do you find out...

Drive-by downloads 3: web anti-malware services

Read previous: Drive-by downloads 2: malware code implementation and preventive measures Concluding their in-depth discussion of drive-by downloads, Neil Daswani and Lars Ewe provide some tips for avoiding the consequences of such infestation. These recommendations are split into specific steps webmasters...

Drive-by downloads 2: malware code implementation and preventive measures

Read previous: Drive-by downloads: exploiting cross-site scripting vulnerabilities As Neil Daswani and Lars Ewe are moving on with their discussion, they outline the five main steps that cyber criminals tend to take for conducting drive-by downloads. Additionally, some helpful recommendations are provided as...

Drive-by downloads: exploiting cross-site scripting vulnerabilities

Engineering manager at Twitter (co-founder of Dasient) Neil Daswani and CTO at Cenzic Lars Ewe have a discussion of today’s Internet safety challenges at RSA 2011 Conference – ‘Drive-by downloads: How To Avoid Getting a Cap Popped in Your App’. Their focus areas in this part of the talk...

Facebook privacy concerns 2: data sharing pitfalls and tweaking privacy settings

Read previous: Facebook privacy concerns: Timeline profile and user tracking Are you really in charge of what’s being shared about you on Facebook? Is there large-scale data mining going on, you being part of it? This Zen Archer’s article provides an insight into these issues for you to get a better...

Facebook privacy concerns: Timeline profile and user tracking

This entry by Zen Archer gives an up-close glimpse of some of the current concerns associated with Facebook privacy. A special focus here is on the Timeline profile’s privacy-infringing peculiarities and user tracking implementation. Facebook is different now. A lot of people say it is a pivot, going from...

Terrorist Groups in the Online World: Mikko Hypponen at RSA Conference 2012

Mikko Hypponen talks on links between online crime, Windows trojans and funding the insurgents, explains the roots of some terrorist online publications and extremist malware. So my latest research has been into the Internet use as done by extremist and terrorist organizations. And when we start to think...

Online Espionage 2: email backdoors and RSA hack

Moving on with his “Online Espionage” talk, Mikko Hypponen is providing a number of specific examples of attacks through email attachments containing backdoors for implementing subsequent contamination of the targeted systems. Mr. Hypponen is also giving an insight into the RSA hack issue, outlining the...

Online Espionage: Mikko Hypponen at SecTor IT security conference

What is the present-day governmental and nation states espionage like and how should security companies treat it? How do emails with contagious attachments transform into critical privacy problems? How do you tell that you’re being spied on? The well-known malware adventurer and cybersecurity analyst...

The machinery of cybercrime 3: online card and ID markets

Read previous: The machinery of cybercrime 2: terror funding via the Internet Jeff Bardin entirely dedicates the final part of “The Machinery of Cybercrime” talk to the card and ID markets as a substantial component of the large-scale worldwide criminal effort. Some of the specifics touched upon are...

The machinery of cybercrime 2: terror funding via the Internet

Read previous: The machinery of cybercrime: malware infrastructure and ties to terrorism Continuation of Jeff Bardin’s talk called “The Machinery of Cybercrime” where he gives a special emphasis to terror funding sources, including the peculiarities of money movements via the Internet and stolen...

The machinery of cybercrime: malware infrastructure and ties to terrorism

The Chief Intelligence Strategist for ‘Treadstone 71’ Jeff Bardin presents his overview of cybercrime from several different angles. Mr. Bardin describes cyber fraud as viewed from within this industry, outlining such aspects as credit card fraud, botnet operations, spam distribution, phishing, money...

“How safe is your browser?” – 3: unique browser fingerprints and trackability prevention

Read previous: “How safe is your browser?” – 2: Trackable browser fingerprints Peter Eckersley moves on with his instructive talk on browser uniqueness. The final part of his speech explicates the issue of browser fingerprints that are constant over time, lists the browsers best coping with this...

“How safe is your browser?” – 2: Trackable browser fingerprints

Read previous: “How safe is your browser?” – Peter Eckersley on personally identifiable information basics The second part of Peter Eckersley’s Defcon talk called “How unique is your browser?” is dedicated to describing the ‘Panopticlick’ experiment set up by the Electronic...

“How safe is your browser?” – Peter Eckersley on personally identifiable information basics

Technology Projects Director for EFF Peter Eckersley speaks at Defcon 18 on methods for identifying a person based on different sets of information, including data like one’s ZIP code, birthdate, age and gender, gradually shifting the focus onto some computer-based criteria such as cookies, IP address,...

Defending the Net: Mikko Hypponen on current privacy issues

Computer security analyst Mikko H. Hypponen presents his talk at TEDxBrussels event dedicated to the present-day privacy concerns, providing specific examples of such breaches and emphasizing the consequences. Mr. Hypponen also speaks on the three groups of online attackers and outlines the differences in...

“Who unleashed Stuxnet?” – Mikko Hypponen on the origin of the Stuxnet virus

The well-known malware researcher Mikko Hypponen (CRO at F-Secure) speaks on the probable origin and objectives of the notorious Stuxnet virus, outlines mobile malware issues and sheds some light on the mysteries around Conficker worm. When Stuxnet was originally found in summer of 2010, we didn’t really...

The History and the Evolution of Computer Viruses: 2009-2011

This is the final part of Mikko Hypponen’s Defcon 19 speech where he dwells on the latest cyber infections that appeared after 2009 and stay active up till now. It took virus writers years to create some of those, so they were made very sophisticated and barely comparable with the older threats in...

The History and the Evolution of Computer Viruses: 2003-2008

Continuing his talk at Defcon 19, F-Secure’s CRO Mikko Hypponen analyzes the shift that took place in the computer virus world around 2003. In this part, he is focusing on moneymaking techniques implemented through keyloggers, spam generating viruses, bots and rootkits. 2003 – 2005 But something even...

The History and the Evolution of Computer Viruses: 2001-2004

What were the main cyber challenges in 2001-2004? These and some other issues are thoroughly addressed in part 4 of Mikko Hypponen’s Defcon 19 speech called “The History and the Evolution of Computer Viruses”. 2001 – 2004 …But then things started changing. We entered the years of...

The History and the Evolution of Computer Viruses: 1996-2001

In the third part of his talk, Mikko Hypponen proceeds with the chronological analysis of digital threats, emphasizing the dominating tendencies on the arena of computer viruses during the period 1996-2001: the influx of email worms and Windows network share replicating viruses. 1996 – 2001 The early...

The History and the Evolution of Computer Viruses: 1991-1996

Second part of Mikko Hypponen’s speech “The History and Evolution of Computer Viruses” which encompasses the time frame 1991-1996 and reviews funny DOS viruses, some of the first Windows infections and quite a bit more stuff you should find interesting. 1991 – 1992 Now, many of you...

The History and the Evolution of Computer Viruses: 1986-1991

CRO at F-Secure Mikko Hypponen provides a captivating insight into the onset and advancement of computer infections in his talk at Defcon 19 called “The History and the Evolution of Computer Viruses”. This part of the speech is dedicated to a detailed description of the first viruses that came on...

Spam in social networks: Mikko Hypponen and Sean Sullivan on new spam issues

We are pleased to present a relevant discussion of the present-day social networking spam issues from a professional perspective. The experts participating in the talk are the famous ‘malware adventurer’ and F-Secure’s CRO Mikko Hypponen, and Sean Sullivan – Security Advisor at...

How to hack Facebook account 4: Geolocation via cross-site scripting

Read: How to hack Facebook account: Facebook profile hacking by PHP session hijacking Read: How to hack Facebook account 2: using LCG for Facebook profile hacking Read: How to hack Facebook account 3: applying Cross-Protocol Scripting to attack victim’s network In the final part of Samy’s talk...

How to hack Facebook account 3: applying Cross-Protocol Scripting to attack victim’s network

Read: How to hack Facebook account: Facebook profile hacking by PHP session hijacking Read: How to hack Facebook account 2: using LCG for Facebook profile hacking Having hacked the targeted Facebook account, which is outlined in the previous part of the speech, Samy Kamkar manages to get into the prey’s PC...

How to hack Facebook account 2: using LCG for Facebook profile hacking

Read: How to hack Facebook account: Facebook profile hacking by PHP session hijacking Samy Kamkar continues his talk “How I Met Your Girlfriend” on hacking Facebook account, shedding some light on the use of LCG for reducing the amount of entropy So let’s take a little closer look. If...

How to hack Facebook account: Facebook profile hacking by PHP session hijacking

Security researcher and former hacker Samy Kamkar delivers a speech at Defcon called “How I Met Your Girlfriend” where he introduces a PHP-based method of compromising a Facebook account for strictly personal purposes. Below is the adapted text version of his talk. So this is a discovery and...

You will be billed $90,000 for this call 4: mobile malware distribution patterns and protection tips from F-Secure

Read: You will be billed $90,000 for this call: Mikko Hypponen (F-Secure) on Dialers, telephone fraud, mobile malware Read: You will be billed $90,000 for this call 2: F-Secure detects trojan malware in mobile game Read: You will be billed $90,000 for this call 3: F-Secure discloses mobile app virus...

You will be billed $90,000 for this call 3: F-Secure discloses mobile app virus attacks

Read: You will be billed $90,000 for this call: Mikko Hypponen (F-Secure) on Dialers, telephone fraud, mobile malware Read: You will be billed $90,000 for this call 2: F-Secure detects trojan malware in mobile game These fraud phone numbers are built so that they actually fund money back to the person...