news.sabretoothglobal.com
Win32/Gataka banking Trojan – Detailed analysis | Sabretooth Global News
http://news.sabretoothglobal.com/win32gataka-banking-trojan-–-detailed-analysis
Sophisticated Threats Require An Advanced Persistent Response. BeyondTrust Updates Its Free Vulnerability Assessment Tool →. Win32/Gataka banking Trojan Detailed analysis. August 14, 2012. 1 As soon as the user launches a browser, the malware will inject its malicious payload into it, then patch the certificate checking functionality and also hook selected API functions such as connect in order to intercept all web communications. 4 The bank communicates back to the malware. 5 The malware will relay this...
news.sabretoothglobal.com
FTC cracks down on tech support scams and feds nail fake AV perps | Sabretooth Global News
http://news.sabretoothglobal.com/ftc-cracks-down-on-tech-support-scams-and-feds-nail-fake-av-perps
In a Zero-Day World, It’s Active Attacks that Matter →. FTC cracks down on tech support scams and feds nail fake AV perps. October 4, 2012. The federal government took much needed action today against sleazy PC tech support scammers. And fake AV peddlers. Actions include lawsuits, a judgment of $163 million, and freezing of multiple assets. PC tech support scammers will be familiar to regular readers of this blog because David Harley and others have charted the progress of this scam. 8220;The Federal Tra...
news.sabretoothglobal.com
Security Week | Sabretooth Global News
http://news.sabretoothglobal.com/category/security-week
Category Archives: Security Week. BeyondTrust Updates Its Free Vulnerability Assessment Tool. October 4, 2012. BeyondTrust has released a new version of its free Community Edition Retina vulnerability assessment tool. With Retina Community, enterprises can perform on-the-fly assessments without waiting for the next audit, the company said. read more. Sophisticated Threats Require An Advanced Persistent Response. August 14, 2012. Barracuda Adds Social Media Controls to Web Filter. August 2, 2012. Kaspersk...
news.sabretoothglobal.com
admin | Sabretooth Global News
http://news.sabretoothglobal.com/author/admin
Cisco IP Phone Hack. March 12, 2013. Nice work: All current Cisco IP phones, including the ones seen on desks in the White House and aboard Air Force One, have a vulnerability that allows hackers to take complete control of the devices…. Original article at schneier.com. UK’s new Cyber Security Champion announced. March 11, 2013. In a Zero-Day World, It’s Active Attacks that Matter. October 4, 2012. Krebs on Security News. FTC cracks down on tech support scams and feds nail fake AV perps. October 4, 2012.
blog.sabretoothglobal.com
Client-Side Hacking: Demystified | Sabretooth Global Blog
http://blog.sabretoothglobal.com/client-side-hacking-demystified
Mobile Phone Payment Systems: Security Concerns. In Brief: The Largest Security Breach in History →. June 29, 2011. So now that you know all about what client-side code is and how to modify it, let’s get to the fun part about some vulnerabilities that I’ve come across and how developers could have prevented these potential exploits. I’d like to point out that exploiting these vulnerabilities is not legal and so we cannot endorse any such activity. This content is for purely educational purposes.
blog.sabretoothglobal.com
security breach | Sabretooth Global Blog
http://blog.sabretoothglobal.com/tag/security-breach
Tag Archives: security breach. In Brief: The Largest Security Breach in History. June 30, 2011. To date the largest security breaches in history were Sony’s PlayStation network. After a few weeks of investigation, it turns out that over 77 million users may have had their personal information including names, birth dates, emails and other login … Continue reading →. Advances in Anti-Censorship Technologies. Security Budgets are Tight- Secrets Should be even Tighter. In Brief: The Era of Cyberwars.
blog.sabretoothglobal.com
Sabretooth Global Blog | Page 2
http://blog.sabretoothglobal.com/page/2
Newer posts →. Mobile Phone Payment Systems: Security Concerns. May 24, 2011. Google’s Android-based Nexus S and many upcoming mobile devices will include Near Field Communications (NFC) technology. NFC has many interesting applications. It will allow users to pay for merchandise, obtain and use electronic tickets, initiate peer-to-peer payments, and other similar … Continue reading →. The War on Hackers: Why Fight It? May 3, 2011. The Changing Tides of Data Collection and Privacy. April 25, 2011. Recent...
blog.sabretoothglobal.com
August | 2011 | Sabretooth Global Blog
http://blog.sabretoothglobal.com/2011/08
Monthly Archives: August 2011. Security Budgets are Tight- Secrets Should be even Tighter. August 30, 2011. Ethical hacking, the topic of IT security assessments, along with threat and risk assessments have all been written and spoken about, with experts dissecting different kinds of breaches. One thing continues to stand out–the company CEO mindset: how much for … Continue reading →. Black Hat: Some Surprising Cyber Security Facts. August 9, 2011. Advances in Anti-Censorship Technologies.
blog.sabretoothglobal.com
client-side hacking | Sabretooth Global Blog
http://blog.sabretoothglobal.com/tag/client-side-hacking
Tag Archives: client-side hacking. June 29, 2011. Client-side vulnerabilities are some of the easiest to exploit and are very prevalent. If you don’t know, client-side means that all of the code runs on your local computer. When you load up a website, anything you see in the … Continue reading →. Advances in Anti-Censorship Technologies. Security Budgets are Tight- Secrets Should be even Tighter. Black Hat: Some Surprising Cyber Security Facts. In Brief: The Era of Cyberwars.