13 Nov 2013

Adobe Breach Compromised 234,379 Military and Government Accounts

On October 3rd, Adobe announced a data breach which at the time they believed only affected 3 million accounts, however towards the end of October a database leaked that contained more than 150 million usernames and encrypted passwords. The diverse customer base of Adobe is reflected in the database. In

21 Oct 2013

Security Visualization: Mapping DDoS Attacks Worldwide in Real-Time

Google Research’s “Big Picture Group” in collaboration with Arbor Networks and Google Ideas has developed the Digital Attack Map, an impressive utility that provides real-time visualization of global DDoS attacks. The tool also surfaces anonymous attack traffic data to let users explore historic trends and find reports of outages happening

06 Oct 2013

Distributed Nmap Port Scanning with a DNmap Megacluster

The legally dubious Carna Botnet and Internet Census 2012 took advantage of systems facing the Internet  running Telnet with the username and password root:root. Hijacking these systems enabled the anonymous security researcher(s) to quickly create a botnet of scanners that scanned the entire Internet (IPv4 range) incredibly quickly. I was curious

01 Oct 2013

Siri Is A Snitch: Interrogate Your Way Past the iOS 7 Lock Screen

Adding to the growing list of security vulnerabilities and work arounds being discovered for iOS 7 is the fact that the lock screen can easily be bypassed by simply using Siri. Siri is enabled by default in iOS 7, and by pressing the home button you can activate Siri and

19 Sep 2013

Building OS X Trojans with AppleScript, Homoglyphs and iTunes

A recent report is stating that a Mac based Trojan attributed to the Syrian Electronic Army (SEA) was discovered, although not a lot of information regarding the malware has been provided, it should be noted that creating a Trojan for OS X is not particularly difficult. A year or so