How To Prepare For A DDoS Attack: 10 Steps

Distributed denial of service (DDoS) attacks are scary. In a matter of
minutes, they can shut down a network, service or website, costing
companies millions of dollars.

A recent study by Corero Network Security found that while 34 percent of
IT managers surveyed cited lo

Rabu, 01 Jun 2016
Flaws in Samsung’s ‘Smart’ Home Let Hackers Unlock Doors and Set Off Fire Alarms

Now one group of researchers at the University of Michigan and
Microsoft have published what they call the first in-depth security
analysis of one such “smart home” platform that allows anyone to control
their home appliances from light bulbs to locks with a PC or sm

Rabu, 01 Jun 2016
The Security of Things Forum 2016 Call For Submissions

The Security of Things Forum 2016 (SECoT 2016) is soliciting
submissions for the third annual SECoT Forum to be held at the Sheraton
Commander Hotel in Cambridge, MA September 22, 2016. Use the form
provided to submit your talk, presentation or research for inclusion in

Rabu, 01 Jun 2016
Rooting the Amazon Echo

"tl;dr - The Amazon Echo looks for an external SD card when it boots up.
If you format one correctly and attach it in the way that I describe,
the Echo will boot from your card and then you can access the Echo
filesystem by mounting the internal eMMC card. This will allow f

Rabu, 01 Jun 2016
Dark Motives Online: An Analysis of Overlapping Technologies Used by Cybercriminals and Terrorist Organizations

To answer the question we posed before: Yes, cybercriminals and
terrorists are more similar than we think – they use similar platforms
and services online, but also with some key differences.
Unsurprisingly, remaining anonymous is of utmost importance to

Rabu, 01 Jun 2016
Home Brew iPhone Malware Kit Makes Spying On Apple Devices Easy

But when one has access to an iPhone, it’s possible to quickly install
malware that appears to be legitimate, as shown by a new software called
Su-A-Cyder, which automates the process of creating quick and dirty spyware.

As shown in the video below, the tool can help spi

Selasa, 31 May 2016
Phantom riders abusing stolen Uber users' accounts for strange journeys

Scammers are stealing Uber users' account credentials and abusing them
to take "phantom rides" wherever they want.

As reported by The Guardian, all sorts of people, including TV
personalities, have had their accounts taken over by scammers and
charged for r

Selasa, 31 May 2016
Is your train or bus eavesdropping on your conversation?

In at least two US states, privacy advocates are raising questions
about the use of surveillance equipment to record audio on trains and buses.

New Jersey Transit is defending its recording audio on light rail
trains, although the agency won’t say exactly how it is using

Selasa, 31 May 2016
Phishing Campaign Sends Out Scam Emails Containing Recipient’s Home Address

A new phishing scam is targeting thousands of people with scam emails
that contain the recipient’s home address.

On Wednesday, Zack Whittaker, a writer for ZDNet, received a spam email
that contained his home address from approximately eight years ago.


Selasa, 31 May 2016
Dark Web marketplace “Nucleus” vanishes – and no one knows why

Collapse of the Nucleus

This time, it’s a drug-related market called Nucleus, and no one seems
to know quite why the site has vanished.

Busted? On the run from law enforcement? Doing a giant bilk? Hacked
through a security hole? Hit by ransomware?

Selasa, 31 May 2016
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: