Security

Hacking servers of BitTorrent and uTorrent – source code leak

Hacker MentaL revealed details of the story, which nearly resulted in the release of the source code BitTorrent, as well as documents of BitTorrent Inc., Including financial records. In May 2013 MentaL got full access to company servers of BitTorrent. Examining the contents of the servers and making a copy of the source code, he still decided to notify the…

Continue Reading

Security

Tools used by the NSA

In documents Snowden mentioned the names of a number of secret NSA programs for tapping the traffic and so on. Objectives of some of these programs (both PRISM) are clear, while others remain unknown. In particular, the slides were the names NUCLEON, MARINA and MAINWAY. What it is, no one knows. But we can make a search in the public domain for those keywords. For example,…

Continue Reading

Security

There was a suspect in the disclosure of information about the authors of Stuxnet

U.S. intelligence agencies continue to look for the culprit in the declassification of classified cyber operations to introduce the Stuxnet worm in Iran’s computer systems. Details about the operation “Olympic Games” were published in NY Times June 1, 2012 . The article describes how the meeting took place with President Obama, which report in detail on the implementation of Stuxnet. The President kept his…

Continue Reading

Security

Edward Snowden trained by the NSA

The papers of Edward Snowden not give enough clarity about what exactly he was doing for the NSA, what was his position. He was not told about it, and his employer is also silent. Snowden officially called the technician or system administrator, but in an interview with China Morning Post, he described himself as “infrastructure analyst” who had “access to lists…

Continue Reading

Security

Encryption is the first stop to intercept communications

It is no secret that government agencies are constantly monitoring communications of individuals, that is, ordinary citizens. In the case of the American system of surveillance is particularly interesting to see how often the interception of communications, whether it is a permanent process or occasionally activated action. In this sense, it makes sense to a new document , which was published by the…

Continue Reading

Security

OWASP – Top 10 Vulnerabilities

Topping the list of the most dangerous and widespread flaws in web-applications was taken by injection of code. According to the creators of Open Web Application Security Project (OWASP), which for the past 10 years is the top 10 most dangerous vulnerabilities in web-applications published the final version of the rankings in 2013. The purpose of the publication of this…

Continue Reading

Security

New Windows-backdoor deletes MBR

Antivirus company Trend Micro warns of a new backdoor BKDR_MATSNU.MCB , which is actively promoted through mass mailings, especially in Germany. The malware has the unpleasant feature: a command from the remote C & C-server, or it can block the loading of the PC, or delete the master boot record. Backdoor class ransomware before that extorts money from the victim.…

Continue Reading

Security

Critical vulnerability in 60 + models of CCTV and IP-cameras

A group of students from the European University of Madrid published the results of their thesis at the Faculty of Information Technology. They explored the protection of the various surveillance systems found on the Internet through Google and Shodan. In total, they analyzed 9 systems, they found 14 vulnerabilities, from simple XSS and CSRF to very dangerous, such as the…

Continue Reading

Security

Hack a Samsung TV with SmartTV function

As reported in his blog, Helfurt German researcher Martin (Martin Herfurt), was able to crack the Samsung TV with function SmartTV. The expert noted that a successful cyber attack carried out from a remote computer to broadcast programs on technology HbbTV (Hybrid Broadcast Broadband TV), used in Samsung TVs.   After he managed to hack the system to replace the…

Continue Reading

Security

The man who “almost broke the Internet”

Two weeks ago Sven Olaf Kamfius (Sven Olaf Kamphuis) was arrested in Spain, of the company Cyberbunker. He was taken to the Netherlands, where he was held in court. Most likely, the lawsuit was filed against Kamfiusa antispam company Spamhaus – a recent victim of DDoS-attacks with the capacity of 300 Gbit/s, which was also called “the biggest attack in…

Continue Reading