Evidence emerges suggesting hijacking of huge chunks of Internet traffic

image thumb91

Researchers from network intelligence firm Renesys published an assessment this week that documents dozens of distinct hijacking events within the last few months where huge chunks of Internet traffic were purposefully diverted through distant service providers leading them to speculate that the traffic may have been “surreptitiously monitored or modified before being passed along to…

Read more

Users beware – yet another way to secretly save SnapChat pictures without the other user knowing it

image thumb541

Besides using another device to capture the SnapChat image and other “hacks” already discovered that makes SnapChat not quite so “snappy”, yet another hack has been discovered which lets users secretly capture screen shots of SnapChat’s “private” pictures without notifying the sender. SnapChat is the self-claimed “sext-friendly” application that lets users share sexy or naked…

Read more

Red October espionage platform begins shutting down after exposure on Monday

image thumb441

The Operation Red October espionage campaign was exposed on Monday (1/14/13) by Russian anti-virus software maker Kaspersky Lab. The Red October network was found to target hundreds of diplomatic, governmental, and scientific organizations in at least 39 countries, including the Russian Federation (the most frequent target), Iran, Kazakhstan, Azerbaijan, Belgium, India, Afghanistan, Armenia, Turkmenistan, and…

Read more

Java vulnerability said to be “massively exploited” and already present in most exploit kits

image thumb481

A previously unknown and currently unpatched vulnerability in the latest version of Java is being “massively exploited” according to researchers. Code that exploits the vulnerability has been added to Blackhole, Cool, Nuclear Pack, and Redkit exploit kits. The attack code is reportedly “highly obfuscated” meaning it’s likely getting past security checks. According to researchers, the…

Read more