Adobe Breach Compromised 234,379 Military and Government Accounts
On October 3rd, Adobe announced a data breach which at the time they believed only affected 3 million accounts, however towards the end of October a database leaked that contained more than 150 million usernames and encrypted passwords. The diverse customer base of Adobe is reflected in the database. In
Security Visualization: Mapping DDoS Attacks Worldwide in Real-Time
Google Research’s “Big Picture Group” in collaboration with Arbor Networks and Google Ideas has developed the Digital Attack Map, an impressive utility that provides real-time visualization of global DDoS attacks. The tool also surfaces anonymous attack traffic data to let users explore historic trends and find reports of outages happening
Distributed Nmap Port Scanning with a DNmap Megacluster
The legally dubious Carna Botnet and Internet Census 2012 took advantage of systems facing the Internet running Telnet with the username and password root:root. Hijacking these systems enabled the anonymous security researcher(s) to quickly create a botnet of scanners that scanned the entire Internet (IPv4 range) incredibly quickly. I was curious
Siri Is A Snitch: Interrogate Your Way Past the iOS 7 Lock Screen
Adding to the growing list of security vulnerabilities and work arounds being discovered for iOS 7 is the fact that the lock screen can easily be bypassed by simply using Siri. Siri is enabled by default in iOS 7, and by pressing the home button you can activate Siri and
Building OS X Trojans with AppleScript, Homoglyphs and iTunes
A recent report is stating that a Mac based Trojan attributed to the Syrian Electronic Army (SEA) was discovered, although not a lot of information regarding the malware has been provided, it should be noted that creating a Trojan for OS X is not particularly difficult. A year or so