TeslaCrypt Ransomware Project Appears to Shut Down, Offers Free Decryption KeyCatalin Cimpanu, SoftpediaAn ESET researcher discovered yesterday that the vaunted TeslaCrypt ransomware operation shut down and is now offering a free decryption key that anyone can use to unlock their files. ....Jumat, 03 Jun 2016
Inside The Million-Machine Clickfraud Botnet Alexandra Gheorghe, BitDefender LabsThe current generation of clickbots such as the Redirector.Paco Trojan have taken abuse to a whole new level, burning through companies’ advertising budget at an unprecedented pace. ...Jumat, 03 Jun 2016
Dogspectus Ransomware AnalysisHoming Tay, Security Research (Fortinet Blog)On April 25, 2016, Blue Coat published an article on a new Android Ransomware, called "Dogspectus.” On May 12, 2016, Dell SonicWALL published a separate report on the Android Lockscreen malware campaign with similar characteristics to Dogspectus. These similarities are not a coincidence. We began our own extensive investigation into this ransomware some time ago, and will share additional technical details of this malware here that have not been previously discussed. .....Jumat, 03 Jun 2016
Children's National Health System breached, data of 4K patients compromisedGreg Masters, SC MagazineMore than 4,000 patients of Washington, D.C.-based Children's National Health System (CNHS) received notices of a data breach following a former vendor disclosing patient health information on an FTP site viewable on the web. ...Jumat, 03 Jun 2016
Vulnerability Deep Dive: Exploiting The Apple Graphics Driver And Bypassing KASLRWilliam Largent, Talos Blog (Cisco)Cisco Talos vulnerability researcher Piotr Bania recently discovered a vulnerability in the Apple Intel HD 3000 Graphics driver, which we blogged about here. In this post we are going to take a deeper dive into this research and look into the details of the vulnerability as well as the KASLR bypass and kernel exploitation that could lead to arbitrary local code execution. These techniques could be leveraged by malware authors to bypass software sandbox technologies, which can simply be within the software program (browser or application sandbox) or at the kernel level.Kamis, 02 Jun 2016
Swipebuster lets you spy on Tinder users – privacy lesson or invasion?John Zorabedian, Naked Security (Sophos Blog)If you’ve ever wanted to know if your friends or lovers are using the Tinder dating app, now there’s a tool for you to find out. ......Kamis, 02 Jun 2016
Social Autopsy wants to expose trolls' real identities - but is that wise?Graham Cluley, Graham Cluley BlogGood people sometimes do dumb things, or say something thoughtless. ......Kamis, 02 Jun 2016
Senator Wyden pledges to fight limits on encryptionJoseph Menn, ReutersU.S. Senator Ron Wyden pledged on Wednesday to fight legislation expected shortly in Congress that would limit encryption protection in American technology products. ....Kamis, 02 Jun 2016
Schools are helping police spy on kids’ social media activityKaren Turner, The Switch (The Washington Post)Schools in Florida are renewing a program that monitors their students' social media activity for criminal or threatening behavior, although it has caused some controversy since its adoption last year ...Kamis, 02 Jun 2016
Privacy International: GCHQ has been building a database of UK citizens' personal information for 15 yearsDave Neal, V3The information was revealed in a series of documents after the campaign group won a court case against the spy agency. .....Kamis, 02 Jun 2016
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: