Lucene search

K

WordPress Bitcoin Payments – Blockonomics Security Vulnerabilities

thn
thn

JonDo 00.15.004 IP changer with Bitcoin, connection manipulation protection and higher efficiency

JonDo 00.15.004 IP changer with Bitcoin, connection manipulation protection and higher efficiency JonDos publishes a new version of the JonDo-Software, an IP changer and IP anonymization program, that you can use for anonymous surfing in the Internet with high security anonymous proxy...

6.7AI Score

2011-08-11 04:28 AM
6
thn
thn

#Blackhat Conference : Square Mobile Gadget allows to Hack Credit Cards

#Blackhat Conference : Square Mobile Gadget allows to Hack Credit Cards Researchers at the Black Hat security conference today revealed two ways the Square payment system, which turns any iPhone, iPad or Android into a point-of-sale credit card processor, could be used for fraud. Square a...

6.6AI Score

2011-08-05 12:50 PM
6
threatpost
threatpost

Researchers: Square Card Reader Provides Straight Line to Illicit Cash?

Security researchers at the Black Hat Briefings demonstrated a method for turning purloined credit card information into cash, this time using Square, a free credit card reader that promises to turn anyone with a mobile device into a merchant capable of accepting credit card payments. Adam Laurie.....

-0.3AI Score

2011-08-05 01:02 AM
4
vulnerlab

0.2AI Score

2011-07-28 12:00 AM
7
vulnerlab

7.1AI Score

2011-07-28 12:00 AM
32
threatpost
threatpost

Alleged Anonymous Member Faces Internet Ban, Monitoring Software

The U.S. Government is demanding that an alleged member of the online hacking group Anonymous be banned from using the Internet as a condition of his release, but won’t require him to run FBI monitoring software on his computers, saying the monitoring wasn’t enforceable. In a motion filed on July.....

1.5AI Score

2011-07-25 05:42 PM
2
packetstorm

-0.5AI Score

2011-07-25 12:00 AM
30
thn
thn

Yellowstone County website hacked - Tax Payers Information at Risk

Yellowstone County website hacked - Tax Payers Information at Risk Yellowstone County has taken its website offline after the state's technology department discovered the site had been hacked. The website will be brought back online in stages when it is safe to do so, a process that is expected...

6.6AI Score

2011-07-15 09:32 AM
2
threatpost
threatpost

Kim Kardashian Wants to Know Why People Hack

If you somehow needed further evidence after the run we’ve been on with WikiLeaks, Anonymous and LulzSec that security and hacking have invaded the mainstream consciousness, that evidence has arrived in the form of a philosophical question from none other than Kim Kardashian. In a message to her...

1.2AI Score

2011-07-01 03:06 PM
3
rdot
rdot

P.A.S. (php web-shell)

** P.A.S. v.3.0.x ** Возможности : - Авторизация по кукам. - Шифрование шелла по вашему паролю сразу при скачивании. - Файловый менеджер : групповое удаление, перемещение, копирование, скачка и загрузка файлов и директорий. переименование и создание файлов и директорий. правка, просмотр,...

0.3AI Score

2011-07-01 12:00 AM
597
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Electronic Payment Cancellation Email Messages on April 8, 2014

Medium Alert ID: 23517 First Published: 2011 June 29 14:00 GMT Last Updated: 2014 April 10 13:53 GMT Version: 80 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain an electronic payment cancellation for the recipient. The text in the...

0.1AI Score

2011-06-29 02:00 PM
13
threatpost
threatpost

U.S. Playing Catch Up in Security for Contactless Devices

AMHERST, MASS.– The U.S. may boast the world’s largest economy, richest technology companies and a lion’s share of its top research universities. But when it comes to the subject of security of RFID (Radio Frequency ID) and other contactless technologies, America is still playing catch-up. The...

-0.8AI Score

2011-06-27 06:40 PM
5
packetstorm

0.2AI Score

2011-06-27 12:00 AM
16
threatpost
threatpost

Android NFC Bug Could Be First Of Many

Google is working on a fix for a newly discovered vulnerability affecting Nexus S Android phones that could cause applications on the phone to crash using incorrectly formated Near Field Communications (NFC) transactions. The issue, which will be discussed at an upcoming technical conference on...

-0.7AI Score

2011-06-21 11:31 AM
11
metasploit
metasploit

Windows Gather Bitcoin Wallet

This module downloads any Bitcoin wallet files from the target system. It currently supports both the classic Satoshi wallet and the more recent Armory wallets. Note that Satoshi wallets tend to be unencrypted by default, while Armory wallets tend to be encrypted by...

AI Score

2011-06-21 03:26 AM
45
vulnerlab

7.1AI Score

2011-06-21 12:00 AM
33
vulnerlab

0.6AI Score

2011-06-21 12:00 AM
12
rdot
rdot

Mt.Gox взломан

Mt. Gox — одна из крупнейших Bitcoin бирж, позволяющих обменивать «цифровое золото» на вполне реальные деньги. В результате взлома в руки злоумышленников попали данные о пароле (в зашифрованном виде), логине и почте пользователей. После взлома, пока по непонятной причине, курс биткоинов на бирже...

0.5AI Score

2011-06-21 12:00 AM
12
exploitdb

7.4AI Score

2011-06-14 12:00 AM
42
packetstorm

0.3AI Score

2011-06-14 12:00 AM
33
exploitpack
exploitpack

cubecart 2.0.7 - Multiple Vulnerabilities

cubecart 2.0.7 - Multiple...

0.6AI Score

2011-06-14 12:00 AM
37
thn
thn

CitiBank hacked & large number of customer data stolen

CitiBank hacked & large number of customer data stolen Security breaches happen, they're going to continue to happen … the mission of the banking industry is to keep the customer base safe and customers feeling secure about their financial transactions and payments Citigroup said today that...

6.8AI Score

2011-06-09 07:28 AM
3
threatpost
threatpost

Time to Focus on Results-Oriented Security

The security industry is full of pernicious problems with no easy solutions. Take spam, for example. The current best defense is filtering out the obvious spam messages. Yet, the countermeasure is not a solution: As anti-spam technology gets better, spammers merely churn out more spam and achieve.....

-0.8AI Score

2011-06-08 02:33 PM
4
threatpost
threatpost

Stop Payments Stop Spam, Researchers Find

“Follow the money” – it was good advice for Woodward and Bernstein in their investigation of the Watergate scandal. It turns out to be good advice for those wishing to stamp out spam e-mail, also. That’s the conclusion of researchers from the University of California, San Diego and the University.....

-0.4AI Score

2011-05-27 03:32 PM
6
threatpost
threatpost

Is Google Wallet Secure? What You Need to Know

Google announced its long-awaited mobile payments platform, Google Wallet, in New York City on Thursday. The company claims it will revolutionize commerce. But with stories about massive data breaches and hacks an almost daily occurance, consumers are most concerned about whether Google Wallet is.....

-0.7AI Score

2011-05-26 07:28 PM
9
thn
thn

Role of Hacking in Stealing and Selling Credit Cards !

Role of Hacking in Stealing and Selling Credit Cards ! People use the Internet in their everyday lives. With technology advancing as fast as it is, most modern day homes have gone online, turning to the Internet to save time with busy days, performing simple tasks like online banking,...

7.2AI Score

2011-05-19 10:05 AM
30
thn
thn

White House Cyber-Security Strategy Could Guard Health Care Payments !

The National Strategy for Trusted Identities in Cyberspace aims to help consumers pay for services such as health care more securely and avoid identity theft. Recent guidelines issued by the White House on cyber-security could provide an impetus for secure online bill paying in health care,...

6.9AI Score

2011-05-10 11:53 PM
1
thn
thn

CCAvenue payment gateway hacked !

CCAvenue.com is a Commerce Service Provider, authorized as a Master Merchant, by Indian financial institutions, to appoint Sub Merchants, to accept and validate Internet payments via Credit Card, and Net banking facilities from the end-customers in real-time. Its one of the leading payment gateway....

7.7AI Score

2011-05-05 07:08 PM
12
threatpost
threatpost

Phisher Hooks Condé Nast, Reels in $8 Million

Condé Nast was baited in a phishing scam that netted a Texas man nearly $8 million in company funds, according to published reports. According to a complaint filed in Manhattan District Court by the U.S. Attorney’s Office last week, the publishing giant was fooled by a single phishing e-mail sent.....

0.3AI Score

2011-04-05 02:45 PM
7
threatpost
threatpost

Lessons Learned From the LizaMoon SQL Injection Attack

Last week, a large scale SQL Injection attack dubbed LizaMoon, referencing one of the domain names used in the attack, surfaced. This attack targets websites by injecting code that redirects visitors to a rogue anti-virus (AV) site. While on the AV site, visitors are presented with fake antivirus.....

-0.1AI Score

2011-04-05 02:41 PM
5
threatpost
threatpost

iTunes Users Puzzle, Fume Over Account Hacks

Terry Coffey of Anchorage, Alaska, said that he first became aware of a problem with his iTunes account when he received a receipt for a $50 iTunes gift card purchase. Coffey, who says he’s careful with his money, was immediately suspicious and investigated the charge, but couldn’t find any record....

-0.8AI Score

2011-03-31 09:44 PM
2
threatpost
threatpost

Report: Rustock Operators or Operator

A Krebsonsecurity piece looks into the unknown party behind the Rustock botnet, and whether it may have been operated by just one person. By interviewing investigators involved in the takedown, a joint operation carried out by Microsoft, FireEye, and various law enforcement agencies, Krebs...

2AI Score

2011-03-29 07:12 PM
4
threatpost
threatpost

New Malware, JKDDOS, Targets Commodities Investment Firms

Researchers at Arbor Networks say they have discovered unique samples of a new family of malware that is targeting large investmen firms with holdings in the commodities markets, especially the mining industry. The malware, dubbed ‘JKDDOS,’ is used to launch distributed denial of service (DDOS)...

1.1AI Score

2011-03-08 08:29 PM
7
threatpost
threatpost

Phishing Sites Increasingly Targeting University Students

In February, the developing trend of phishing websites targeting universities in the U.S. and the U.K. became increasingly commonplace, and Symantec researchers isolated three exemplative cases. The first targeted a University in the U.K. This phishing attack came via email, and purported that...

AI Score

2011-03-03 04:50 PM
8
thn
thn

Lush website is back online after hacking !

POOLE-based cosmetics retailer Lush is back online after it was forced to suspend internet sales after hackers attacked its website. Lush closed the site last month and asked anyone who placed an online order between October 4 and January 20 to contact their bank in case their card details had...

6.6AI Score

2011-02-24 07:33 PM
5
thn
thn

Kaspersky Lab forecast for the IT threat landscape 2011 – 2020 !

Kaspersky Lab has released its forecast for the IT threat landscape for this decade (2011 – 2020). Kaspersky bases this forecast on an analysis of the main changes and issues in the sphere of IT security over the past decade, as well as emerging trends in the development of personal computers,...

6.9AI Score

2011-02-23 07:49 AM
threatpost
threatpost

New Cheap Toolkit Makes Anyone a Facebook App Developer

New cheap toolkits give amateur developers the ability to create their own viral Facebook applications, something that’s become a favorite activity of attackers in recent months. One example of a malicious Facebook application that could have easily been created using this toolkit is the ‘Facebook....

1AI Score

2011-02-08 05:08 PM
3
threatpost
threatpost

Website of Lush Cosmetics Hacked

The website of cosmetic company Lush has apparently been targeted by hackers as customers who’ve made purchases on their UK website, Lush.co.uk, are being encouraged to check their bank statements for suspicious activity, according to a post on ZDNet. It remains to be seen how exactly the site was....

1.2AI Score

2011-01-21 06:21 PM
8
thn
thn

Hacker Fantasy Cyberworld Of Good And Evil : Wikileaks !

What is the future of political protest, as in a highly digitized world? We follow the real-time display via Wikileaks Cablegate. The day of the cables has been convicted for release in major newspapers worldwide, called a "political hack" cut the Wikileaks site with a distributed denial of...

6.7AI Score

2011-01-21 07:55 AM
2
threatpost
threatpost

Zeus Targeting Online Payment Services

The Zeus Botnet continues to evolve and shift in focus from its traditional targets, banks and their customers, to other money-handling institutions like electronic money and online payment systems, according to a new report. The shift has been going on for months and likely follows policy moves...

1.4AI Score

2011-01-20 08:24 PM
7
threatpost
threatpost

PandaLabs Uncovers the Cyber-Crime Black Market

Inventory is growing and prices are dropping on the cyber crime black market, according to a new report from security firm Panda Labs. Stolen banking credentials, malicious programs and stolen credit cards are all for sale online in what Panda experts say is a flourishing criminal black market...

1.3AI Score

2011-01-20 06:35 PM
5
zdt
zdt

AWBS 2.9.2 (cart.php) Blind SQL Injection Vulnerability

Exploit for php platform in category web...

7.1AI Score

2011-01-17 12:00 AM
20
packetstorm

-0.1AI Score

2011-01-17 12:00 AM
22
exploitdb

7.4AI Score

EPSS

2011-01-16 12:00 AM
33
exploitpack
exploitpack

AWBS 2.9.2 - cart.php Blind SQL Injection

AWBS 2.9.2 - cart.php Blind SQL...

-0.1AI Score

2011-01-16 12:00 AM
17
threatpost
threatpost

Google Release Chrome 8.0.552, Pays $14,000 in Bug Bounties

Google has released version 8.0.552.237 of its Chrome browser, which includes fixes for 16 security vulnerabilities. The company also paid out more than $14,000 in bug bounties for the flaws fixed in this release, including the first maximum reward of $3133.7. The new version of Google Chrome has.....

-0.9AI Score

2011-01-13 02:03 PM
9
thn
thn

Cyber crime trail leads to Winona State students !

A U.S. Department of Homeland Security investigation dubbed "Operation eMule" has led federal agents to a pair of 22-year-old foreign-exchange students in Winona who are suspected to be part of a sophisticated cyber crime ring based in Vietnam that has been misusing the identities of countless...

6.9AI Score

2011-01-04 02:11 AM
6
zdt
zdt

ChurchInfo <= 1.2.12 SQL Injection Vulnerability

Exploit for php platform in category web...

7.1AI Score

2011-01-02 12:00 AM
16
exploitdb

7.4AI Score

2011-01-01 12:00 AM
17
exploitpack
exploitpack

ChurchInfo 1.2.12 - SQL Injection

ChurchInfo 1.2.12 - SQL...

0.2AI Score

2011-01-01 12:00 AM
6
Total number of security vulnerabilities6256