WikiLeaks knocked offline in ongoing feud between OurMine hacking gang and Anonymous

You would be wrong to think that all the hackers, hacktivists, internet
anarchists and members of the computer underground out there get along
fine. Many of them cannot stand each other, and it’s not uncommon to
stumble across any number of spats and turf wars taking place

Senin, 01 Aug 2016
Complex Bitcoin Phishing Scheme Leads Back to Rogue Web Hosting Firm

Researchers from Cisco's OpenDNS security team have uncovered a complex
phishing scheme aimed at collecting user credentials from various
Bitcoin-related services, which, under a closer scrutiny, led back to a
known bulletproof hosting firm.
The crooks behind

Kamis, 14 Jul 2016
Online backup firm Carbonite tells users to change their passwords now

Online backup company Carbonite is the latest firm to have issued a
warning that hackers are attempting to break into its users accounts,
and are prompting all users to change their passwords as a result.

An email has been sent to Carbonite users explaining that the attackers<

Kamis, 14 Jul 2016
New Ransomware called CryptoRoger that appends .crptrgr to Encrypted Files

A new ransomware called CryptoRoger has been discovered today by
MalwareBytes security researcher S!Ri. This ransomware will encrypt a
victim's files using AES encryption and then appends the .crptrgr
extension to encrypted filenames.  The malware dev then demands a ran

Kamis, 14 Jul 2016
The Curious Case of an Unknown Trojan Targeting German-Speaking Users

Last week, an unidentified malware (with SHA-256
171693ab13668c6004a1e08b83c9877a55f150aaa6d8a624c3f8ffc712b22f0b) was
discovered and circulated on Twitter by researcher @JAMES_MHT. Many
researchers - including us - were unable to identify the malware so we
decided to dig

Kamis, 14 Jul 2016
‘GODLESS’ Mobile Malware Uses Multiple Exploits to Root Devices

We came across a family of mobile malware called Godless (detected as
ANDROIDOS_GODLESS.HRX) that has a set of rooting exploits in its
pockets. By having multiple exploits to use, Godless can target
virtually any Android device running on Android 5.1 (Lollipop) or

Kamis, 14 Jul 2016
Mobile Advertising Firm Found Tracking Users To Pay $950K

After settling charges with the Federal Trade Commission this week a
mobile advertising company will pay nearly $1M after it was determined
the company tracked customers – including children – without their consent.

InMobi, an India-based firm with offices across t

Kamis, 14 Jul 2016
The Poisoned Archives

libarchive is an open-source library that provides access to a variety
of different file archive formats, and it’s used just about everywhere.
Cisco Talos has recently worked with the maintainers of libarchive to
patch three rather severe bugs in the library. Because of th

Kamis, 14 Jul 2016
138 security flaws in US defense websites uncovered in Hack the Pentagon

Results are in from the US Department of Defense’s (DoD’s) pilot “Hack
the Pentagon” bug bounty initiative. Top civilian brass say they’re
thrilled: going forward, US hackers should expect more opportunities to
make an honest buck by uncovering new

Kamis, 14 Jul 2016
Rise of Darknet Stokes Fear of The Insider

With the proliferation of shadowy black markets on the so-called
“darknet” — hidden crime bazaars that can only be accessed through
special software that obscures one’s true location online — it has never
been easier for disgruntled employees to har

Kamis, 14 Jul 2016
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: