JudulPenulisKutipanDiposting
‘Blackhole’ Exploit Kit Author Gets 7 YearsBrian Krebs, Krebs On SecurityA Moscow court this week convicted and sentenced seven hackers for breaking into countless online bank accounts — including “Paunch,” the nickname used by the author of the infamous “Blackhole” exploit kit. ....Senin, 16 May 2016
PGP-encrypted comms network allegedly used by criminals shuts down Zeljka Zorz, HelpNetSecurityThe Dutch police has announced on Tuesday that they have pulled a system of encrypted communications used by Dutch and possible foreign criminals off the air, and that they have arrested a 36-year-old man from Nijmegen on suspicion of money laundering.Senin, 16 May 2016
Judge tosses evidence obtained by FBI malware planted on dark websiteJohn Zorabedian, Naked Security (Sophos Blog)A US federal judge has thrown out evidence in a child abuse imagery case obtained by the FBI’s use of a hacking tool. ....Senin, 16 May 2016
Italian Police Arrest 16-Year-Old Anonymous MemberCatalin Cimpanu, SoftpediaToday, Italian police arrested a sixteen-year-old boy from Udine, on the suspicion of being the leader of an Anonymous campaign named #OpSafePharma.Senin, 16 May 2016
Former Reuters journalist gets two years in hacking case Steven Musil, CNETMatthew Keys was convicted of aiding hacktivist group Anonymous in breaking into and defacing the Los Angeles Times Web site. ....Senin, 16 May 2016
Anonymous Member Arrested for the COMELEC HackCatalin Cimpanu, SoftpediaPhilippine authorities announced they arrested Paul Biteng, a 23-year-old college student, for his role in the hacking of the Philippines Commission on Elections (COMELEC) website.Senin, 16 May 2016
The OTHER iPhone unlocking case – Judge sides with AppleJohn Zorabedian, Naked Security (Sophos Blog)A New York judge ruled earlier this week that the government can not force Apple to assist the FBI in unlocking an encrypted iPhone. .....Senin, 28 Mar 2016
BadMirror: New Android Malware Family Spotted by SherlockDroidAxelle Apvrille and Homing Tay, Security Research (Fortinet Blog)Our automated crawling and analysis system, SherlockDroid / Alligator, has just discovered a new Android malware family, on a third party marketplace. ....Senin, 28 Mar 2016
Android Vulnerabilities Allow For Easy Root AccessWish Wu, TrendLabs Security Intelligence Blog (Trend Micro)Qualcomm Snapdragon SoCs (systems on a chip) power a large percentage of smart devices in use today. The company’s own website notes that more than a billion devices use Snapdragon processors or modems. .....Senin, 28 Mar 2016
Android banking trojan masquerades as Flash Player and bypasses 2FALukas Stefanko, WeLiveSecurityActive users of mobile banking apps should be aware of a new Android banking trojan campaign targeting customers of large banks in Australia, New Zealand and Turkey. .....Senin, 28 Mar 2016
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: