background preloader

Twenty Something Asks Facebook For His File And Gets It - All 1,200 Pages

Twenty Something Asks Facebook For His File And Gets It - All 1,200 Pages
April 25, 2014 , 2:48 pm Vulnerability in Viber Allows Intercept of Images, Videos A vulnerability exists in Viber, a messaging and VoIP application similar to WhatsApp, that could allow attackers to intercept sensitive information shared between users like images, videos and location information. Read more... April 25, 2014 , 1:30 pm Exploiting Facebook Notes to Launch DDoS

http://threatpost.com/

People Are Awesome: The Coffee Shop Where Everyone Pays for Everyone Else's Drinks - News The main conceit of the 2000 Kevin Spacey film Pay It Forward is that if one person does a kindness for three strangers, and those three people each do kindnesses for three strangers, and so on, one person can change the world. Rarely do we see this acted out in the real world the way it was cinematically—one scene finds a man giving away his brand-new Jaguar to a guy having car troubles—but on a smaller scale, these sorts of random niceties happen far more often than you might think. Today, it's selflessness at a small coffee house in Bluffton, South Carolina. It all started two years ago at Corner Perk, a small, locally owned coffee shop, when a customer paid her bill and left $100 extra, saying she wanted to pay for everyone who ordered after her until the money ran out. The staff fulfilled her request, and the woman, who wishes to remain anonymous, has returned to leave other large donations every two to three months.

> <html xmlns=" <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>ScadaTEC ModbusTagServer and ScadaPhone Remote Buffer Overflow Vulnerability - SCADAhacker.com September 12, 2011 (Updated December 28, 2011) Independent security research Steven Seeley publicly released a report that included proof-of-concept (PoC) exploit code targeting a remote, buffer-overflow vulnerability in the ScadaTEC ModbusTagServer and ScadaPhone products. Exploitation of this vulnerability requires a specially crafted ZIP archive file to be opened using the affected application. An attacker could exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. ScadaTEC has produced a patch that resolves this vulnerability for all affected products and versions.

FinFisher - IT Intrusion lets Government Agents Steal ALL your info - Lawmen FinFisher ( has arrived to help you FORGET your 4th Amendment rights. The developers provide an array of tools and training to let government agents capture everything from your phone and computer, and even control it remotely without your knowing, including making it seem that you controlled it. offers this: · Tactical IT Intrusion Portfolio - Gamma addresses ongoing developments in the IT Intrusion field with solutions to enhance the capabilities of our clients. Easy-to-use, high-end solutions and techniques complement the intelligence community’s know-how enabling it to address relevant Intrusion challenges on a tactical level.

Debate: The evasiveness of Flame may have been what prevented August 01, 2012 Mikko Hyppönen, chief research officer F-Secure When Flame malware became front-page news, we went digging through our collections for related samples. 'No country is safe from Flame super-virus attack' - Kaspersky Labs The number of locations of flame infections detected by Kaspersky Labs on their customers' machines. Picture: Kaspersky Labs Source: Supplied A POWERFUL new virus has been uncovered which has been sabotaging government systems for at least five years in the Middle East. > <html xmlns=" <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>WellinTech KingView History Server Buffer Overflow Vulnerability - SCADAhacker December 21, 2011 Zero Day Initiative (ZDI) has disclosed to ICS-CERT a report concerning a heap-based buffer overflow vulnerability in WellinTech's Kingview HistoryServer.exe, which may allow a remote, unauthenticated attacker to execute arbitrary code. This vulnerability was reported to ZDI by independent security researcher Luigi Auriemma. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of WellinTech KingView. Authentication is not required to exploit this vulnerability.

So, Why Does the Air Force Want Hundreds of Fake Online Identities on Social Media? [Update] Last Updated Feb 19, 2011 8:05 AM EST Bad enough that spammers are creating fake Facebook accounts that acquire connections with unsuspecting people, then inundate them with crap. Now, though, the U.S. military is looking for software and services to manage upwards of 500 fake online personas designed to interact with social media, presumably including such sites as Facebook and Twitter. Last year, the U.S. Air Force created the document, which resides in the federal government's contract database: Here's the description of the basic service sought:

ICS-CERT report, a worrying increase of cyber attacks It’s been long debated the need to protect critical infrastructures from cyber attacks, cyber threats could hit foreign countries causing loss of human lives identically to a conventional attack. Don’t forget that similar attacks con be organized by state-sponsored hackers or cyber criminals with the different purposes, target destroying or cyber espionage. Emergency Response Teams of every country are approaching the problem, they are working to complete a census of the structures examining their safety level, these groups of works are also working on awareness programs and information sharing, key activities to mitigate the risks. Recently the U.S. Industrial Control System Cyber Emergency Response Team (ICS-CERT) has released a report that alerts on the increasing number of attacks against US critical infrastructure between 2009 to 2011, it is registered an impressive growth of the number of incidents, following its progression:

Related:  idigital2ArticlesStrategic Re-Tweet(s)HTTB Morning Ed. Direct Distributions (V2)misc/unsorted