Telvent, makers of critical electrical grid software, discovered on September 10, 2012 that it had suffered a breach into its network – a sophisticated hacker attack spanning its operations in the United States, Canada, and Spain. Project files were stolen and malware installed by the attackers. Digital fingerprints suggest the attacks are related to Comment…
Category: Computers & Programming
Seven rent-to-own companies secretly monitored and remotely controlled customers’ rented PCs – captured users’ intimate moments
It comes as no surprise that rent-to-own companies can be a little… seedy. Seven rent-to-own companies, comprising 1,617 stores in the United States and Canada, and a software developer based in Pennsylvania, have settled federal charges that they used spyware to remotely monitor their customers who rented personal computers, including turning on webcams to monitor…
Samsung Galaxy S II and S Advance zero-day exploit allow complete phone wipe when tel: link clicked [UPDATE]
If you are running Tor, you might be running a botnet too
Security researchers have identified a new botnet that is controlled by attackers from an Internet Relay Chat (IRC) server running as a hidden service inside the Tor anonymity network. Unable to determine its real location or sniff its encrypted traffic, law enforcement are going to have a tough time shutting it down.
Iran launches organized cyberattack against U.S. banks
The banks of JP Morgan Chase and Bank of America are being increasingly targeted this week, in a systematic denial-of-service (DoS) attack against their websites. National security officials told NBC News that the cyber attacks are originating from the government of Iran and as a result, the cyber threat level was raised from “elevated” to…
Sophos Antivirus flags its own files as malware and then protects you by deleting itself
Attackers have begun exploiting new Zero-Day Internet Explorer vulnerability (UPDATE)
Google stands by its Don’t Be Evil mantra and shows other companies how it should be done
Google stands by its “don’t be evil” motto and shows other corporations how it should be done. Today Google donated $20,000 to the open-source Eclipse development platform (Eclipse is an open-source programming IDE popular with Java and Android developers). Eclipse was forced to shut down their performance testing piece of Eclipse in versions 3.8 and…
An Elite Chinese cyberattack unit has been pawning U.S. computers for three years and counting
Symantec has provided details on an attack system known as The Elderwood Project that appears to be sponsored by the Chinese military complex. The first instance of this attack vector occurred in 2009 when Google computers were comprised by a group using a zero-day exploit in Internet Explorer. it was determined that the group was…
Al Jazeera website hacked
Visitors to Al Jazeera’s website got a surprise overnight. Hackers replaced Al Jazeera’s home page with a message saying it was done in protest against the Doha-based television station’s coverage of the Syrian conflict. The attack lasted for several hours during which visitors were served a page with a Syrian flag and a message explaining…








