Augmenting Society's Collective IQ
Doug Engelbart died on July 2, 2013. He is probably best known, to the general public, as the inventor of the computer mouse. But he was much more than that…"They called him kooky, and laughed at him...
View ArticleSummer Listening: BBC Playlist
"There are now three certainties in life — there's death, there's taxes and there's a foreign intelligence service on your system."~ MI5's Head of CyberBBC Radio 4 recently aired a very interesting...
View ArticleWindows Version of the Janicab Malware
Last week, we wrote about a script-based malware targeting Mac users. Yesterday, the folks from avast! revealed a Windows version.Here is a summary of the difference between the Windows and OS X...
View ArticleCan you find Rebecca Taylor?
Channel 4 (a U.K. broadcaster) News has launched an experimental online identity project called: Data Baby. And the data baby's name is "Rebecca Taylor"— a very common name in the U.K. Channel 4 has...
View ArticleAre Apple developers on the hacker hit list?
Note: this post is condensed from an article written for Digital New Asia.Apple's developer website for its Mac, iPhone and iPad products was taken offline about two weeks ago; shortly afterwards,...
View ArticleOn Fake "F-Secure Security Pack" Malicious Browser Extension
We have been following a malicious browser extension that claims to have been developed by various different software companies.The extension installs itself into the browser and makes posts to social...
View ArticleEncrypted Communications Service Goes Silent
A privacy focused e-mail service used by Edward Snowden has shuttered its doors.According to the owner and operator, Ladar Levison:"I wish that I could legally share with you the events that led to my...
View ArticleBlaster - 3654 Days Later
Yesterday was Blaster's 10th anniversary. Do you remember where you were on August 11, 2003?Mikko remembers (and he still has the related press release [PDF]).Numerous organizations, including several...
View ArticleAre There Good Hackers?
Guy Raz, host of NPR's TED Radio Hour, recently caught up with Mikko while he was attending DEFCON.Mikko's DEFCON recommendation: don't trust anybody — pen and pad work very well. Guy interviewed...
View ArticleJava - The Gift That Keeps On Giving
I bet vulnerability researchers love Java. It seems that especially the 2D sub-component of Java has felt their love lately: since the out-of-band patch for CVE-2013-0809 and CVE-2013-1493 in March...
View ArticleBrowlock Ransomware Targets New Countries
In the past few weeks we have been following the relatively new "police ransomware" family we call Trojan:HTML/Browlock. This ransomware is very simple, and just uses the browser to display a lock...
View ArticleBlocking "MiniDuke" Type Threats Using Exploit Interception
MiniDuke, a cleverly coded Adobe PDF exploit, made news back in February — it was used to target several European governments.Now, more than ever, exploit prevention is a critical layer of defense....
View ArticleRecommend: CERT Polska's ZeuS P2P Report
For those of you interested in excellent banking trojan analysis…Check out CERT Polska's report on the Gameover version of ZeuS:ZeuS-P2P internals understanding the mechanics: a technical reportOn...
View ArticleWe Need To Talk, Google
Dear Google — please don't take this the wrong way, but, well… I think you suck.This hasn't always been the case. Once upon a time, I actually enjoyed using Google services.But today — well, today I...
View ArticleAndroid Malware goes SMTP
Before we get to thinking that nothing is new under the Android malware sun, we get a small, but quite interesting surprise. An android malware that connects to SMTP servers to send an e-mail.Other...
View ArticleNASDAQ's Community Forum
Me, speaking to V3.co.uk's Alastair Stevenson on July 18th:"Imagine this: Suppose the NASDAQ community forum wasn't just compromised for its users' passwords — but also to use it as a watering hole....
View ArticleWi-Fi Honeypots and MAC Address Surveillance
On August 8th, Quartz published a report that recycling bins in the City of London were being used to collect the MAC addresses from phones passing-by. The scheme was halted by August 12th. On the...
View ArticleAndroid Malware: Pincer's Author
Why does Internet security journalist Brian Krebs follow @senneco?Found out the answer in today's Krebs on Security: Who Wrote the Pincer Android Trojan?On 27/08/13 At 03:57 PM
View ArticleVideo: Government-Endorsed Surveillance
IBTimes TV: Government-Endorsed Surveillance"This is not what we built the Internet for." ~ Mikko Hypponen On 28/08/13 At 01:00 PM
View Article