Uncategorized

Hackers Use Wireless for Stealing ATM Users’ PINs

By Jordan Robertson Pilfering the personal identification numbers of financial accounts, a potential jackpot for hackers, is tougher to pull off thanks to data encryption and other security technologies. Yet the arms race continues: Hackers are devising more creative methods to intercept PINs at ATMs, the clearest path to instant cash. “It just blows you […]

Hackers Use Wireless for Stealing ATM Users’ PINs Read More »

Analysis of a Cybercrime Infrastructure – Proofpoint

Hacker tactics are varied, sophisticated, and built for success. This report should be required reading for everyone in the cybersecurity domain. By Jon Oltsik One of the more vapid cybersecurity cliché statements goes something like this: “hacking is no longer about alienated teenagers spending countless hours in the basement on their PCs. Rather, it is

Analysis of a Cybercrime Infrastructure – Proofpoint Read More »

Gartner defines Security Risk as a Trend for 2015

Rise of smart machines, ubiquitous access and software-defined architectures will reshape IT, Gartner says ORLANDO—Gartner defines its Strategic Technology Trends as those technologies that have the most potential to drive great change in the enterprise IT arena in the next three years. Indeed this year’s crop has that potential as trends like software-defined networks and

Gartner defines Security Risk as a Trend for 2015 Read More »

Criminals used malware program to steal from ATMs

Malware found on ATMs in Eastern Europe, but may be spreading to U.S., China and India By Lucian Constantin Criminals have stolen millions of dollars from ATMs worldwide using a specialized malware program that forces the machines to dispense cash on command. The malicious program, dubbed Backdoor.MSIL.Tyupkin, is designed to work on ATMs running 32-bit

Criminals used malware program to steal from ATMs Read More »

Anonymous Meet for the First Time in Real Life

Topiary, TFlow, Kayla, and Pwnsauce take the stage By David Gilbert opiary, TFlow, PwnSauce, Kayla, Avunit, and Sabu. These were the six core member of LulzSec, a disparate group of hackers who bestrode the internetlike giants in 2011, during their 50 Days of Lulz campaign. They spent countless hours interacting, planning, and hacking online, spending up

Anonymous Meet for the First Time in Real Life Read More »