Category: Security News

Cyber attacks live Map

Every second, Norse collects and analyzes live threat intelligence from darknets in hundreds of locations in over 40 countries. The attacks shown are based on a small subset of live flows against the Norse honeypot infrastructure, representing actual worldwide cyber attacks by bad actors. At a glance, one can see which countries are aggressors or …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2014/12/18/cyber-attacks-lie-map/

Download our Forensic eBook – Expert Evidence: Recent Cases

Previously available in limited hard-cover edition, this eBook is the product of the KordaMentha Forensic team combing through more than 1,000 recent cases to identify 140 relevant to principles of expert evidence, and to produce case reviews on over 30 of the most interesting of these. Each case review provides a short background of the …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2014/12/18/download-forensic-ebook-expert-evidence-recent-cases/

Top 2014 cyberattacks attacks and how to avoid them in 2015

2014 saw a host of cyberattacks and their difficult-to-manage consequences. Let us take a look at those infamous incidents and learn what we can do to mitigate the risks in the coming year. http://windowsitpro.com/blog/top-2014-cyberattacks-attacks-and-how-avoid-them-2015

Permanent link to this article: https://www.darknessgate.com/2014/12/18/top-2014-cyberattacks-attacks-avoid-2015/

SoakSoak malware leaves 11,000 WordPress sites blacklisted by Google

More than 11,000 domains reported to have been blacklisted by search engine, but more than 100,000 sites may be affected More than 11,000 websites using the WordPress blogging platform have been blacklisted by Google, after they were infected by the “SoakSoak” malware. Security firm Sucuri, which first reported on the blacklisting, claims that the malware’s …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2014/12/17/soaksoak-malware-leaves-11000-wordpress-sites-blacklisted-google/

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

Computers housing the world’s most sensitive data are usually “air-gapped” or isolated from the internet. They’re also not connected to other systems that are internet-connected, and their Bluetooth feature is disabled, too. Sometimes, workers are not even allowed to bring mobile phones within range of the computers. All of this is done to keep important …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2014/12/14/attackers-can-use-radio-signals-mobile-phones-steal-protected-data/

Cyber reconnaissance

Learn more about cyber reconnaissance

Permanent link to this article: https://www.darknessgate.com/2014/12/14/cyber-reconnaissance/

Kaspersky exposes SONY-CRIPPLING malware DETAILS Looks like Shamoon, quacks like Dark Seoul

Kaspersky bod Kurt Baumgartner has released more details on the Sony-plundering malware and links it to attacks on Saudi Aramco and South Korea. Research conducted in the wake of the epic Sony breach last month had connected those behind the attack known as the Guardians of Peace (GOP) with the 2012 hacking of Saudi Aramco …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2014/12/08/kaspersky-exposes-sony-crippling-malware-details-looks-like-shamoon-quacks-like-dark-seoul/

DeathRing Chinese Trojan Spotted Pre-loaded onto Smartphones

Security experts are warning of a new Chinese trojan which they have discovered pre-loaded onto low-end smartphones popular in Asia and Africa. DeathRing is disguised as a ringtone app but in reality downloads SMS and WAP content from its command-and-control server to the victim’s phone, according to mobile security vendor Lookout. This enables the attackers …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2014/12/08/deathring-chinese-trojan-spotted-pre-loaded-onto-smartphones/

The World Cracks Down on the Internet

In September of last year, Chinese authorities announced an unorthodox standard to help them decide whether to punish people for posting online comments that are false, defamatory, or otherwise harmful: Was a message popular enough to attract five hundred reposts or five thousand views? It was a striking example of how sophisticated the Chinese government …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2014/12/06/world-cracks-internet/

Destover: Destructive malware has links to attacks on South Korea

Backdoor.Destover, the destructive malware that was the subject of an FBI Flash Warning this week, shares several links to earlier attacks directed at targets in South Korea. Some samples of Destover report to a command-and-control (C&C) server that was also used by a version of Trojan.Volgmer crafted to attack South Korean targets. The shared C&C …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2014/12/05/destover-destructive-malware-links-attacks-south-korea/

Android.Smslink

Android.Smslink is a Trojan horse for Android devices that may send malicious SMS messages from the compromised device. It may also display advertisements. Source: http://www.symantec.com/security_response/writeup.jsp?docid=2014-112600-3035-99

Permanent link to this article: https://www.darknessgate.com/2014/12/01/android-smslink/