Canary Watch Project Runs Its Course

Warrant canaries aren’t definitive markers that a company has been
served with a National Security Letter or some other type of court order
mandating that customer information be turned over to a government
agency or law enforcement. But oftentimes, they are a strong indic

Rabu, 08 Jun 2016
Quantum Computing Comes to the Cloud

"IBM has made quantum computing as a cloud service available to the
world for the first time. You can check ideas against a real, functional
device, although the interface also lets users try ideas out on a simulator.
This is not a full-blown quantum computer, but

Rabu, 08 Jun 2016
49% of IT pros retain access to their ex-employer's network

"Half of IT professionals admit to maintaining access to their
employer's network after leaving the company.

A study from Protected Networks found that three quarters of the 49
percent who retained access used their permissions to access their
former employer

Rabu, 08 Jun 2016
Skimmers Found at Walmart: A Closer Look

"Recent local news stories about credit card skimmers found in
self-checkout lanes at some Walmart locations reminds me of a criminal
sales pitch I saw recently for overlay skimmers made specifically for
the very same card terminals.

Much like the skimmers fo

Rabu, 08 Jun 2016
WordPress Sites Under Attack from New Zero-Day in WP Mobile Detector Plugin

"Attackers have been using a newly discovered zero-day in the WP Mobile
Detector plugin to upload backdoor scripts on WordPress sites and are
currently employing it to upload adult-themed SEO spam on affected websites.

The WP Mobile Detector plugin is a simple tool that d

Rabu, 08 Jun 2016
Keep Calm and (Don’t) Enable Macros: A New Threat Actor Targets UAE Dissidents

This report describes a campaign of targeted spyware attacks carried
out by a sophisticated operator, which we call Stealth Falcon.  The
attacks have been conducted from 2012 until the present, against Emirati
journalists, activists, and dissidents.  We discovered this

Selasa, 07 Jun 2016
DDoS Attacks via TFTP Protocol Become a Reality After Research Goes Public

Almost three months after researchers from the Edinburgh Napier
University published a study on how to carry out reflection DDoS attacks
by abusing TFTP servers, Akamai is now warning of real-life attacks.

Akamai SIRT, the company's security team, says its engineers have

Selasa, 07 Jun 2016
FBI Warns of Bitcoin-Based Extortion Attempts Following Recent Mega Breaches

The FBI's Internet Crime Complaint Center (IC3) has issued a public
alert today, warning against a spike in Bitcoin-based extortion attempts
against regular US citizens who had their personal details leaked in one
of the recent mega breaches.

The FBI says crooks coll

Selasa, 07 Jun 2016
TeamViewer Denies Hack, Blames Password Reuse for Compromises

Remote support software company TeamViewer continues to contest claims
this week it was hacked and instead claims that password reuse and
careless user actions may have led to some of its customers’ machines
being compromised.

The German company has been vigilant w

Selasa, 07 Jun 2016
FBI Warns Against Wireless Keystroke Loggers Disguised as USB Chargers

At the end of April, the FBI issued a public alert regarding
KeySweeper, a piece of custom hardware created by security researcher
Samy Kamkar as a proof-of-concept project, capable of stealing
keystrokes from wireless Microsoft keyboards by intercepting nearby
radio signa

Selasa, 07 Jun 2016
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: