Detection of DRDoS attacks is not easy, due to their use of large, trusted servers that provide UDP services. As a victim, traditional DoS mitigation techniques may apply. As a network operator of one of these exploitable services, look for abnormally large responses to a particular IP address.
via Pocket http://ift.tt/1h0XLaY
Two German researchers at the last Chaos Computing Congress in Hamburg revealed how cyber thieves steal money from ATMs win infected USB Sticks. Cyber criminals are exploiting new techniques to attack ATMs (Automated Teller Machines) infecting the devices with specifically crafted malware.
via Pocket http://ift.tt/1dnjiGG
I’m supposed to be on break, but this caught my attention. According to the FBI, members of African criminal enterprises in Indiana, Kentucky, Ohio, Pennsylvania, and West Virginia have come up with a creative way to use stolen credit cards, and it revolves around aluminum foil.
via Pocket http://ift.tt/1clocmm
Summary: Nobody should find it surprising that the NSA can hack into iPhones and there’s no reason to assume Apple is helping them. As we and everyone else are reporting, the latest poop on the NSA is that they claim to be able to hack into iPhones.
via Pocket http://ift.tt/1lxoTev
Last Friday Target issued an update acknowledging that encrypted PIN data were included in the data stolen in their recent breach. This quickly became a hot news segment and the social media was abuzz with renewed criticism of the retailer.
via Pocket http://ift.tt/19ZgoHb
Oh dear. In an inauspicious start to 2014 for both Snapchat and its users, a website appears to have published user name and phone number information for 4.6 million accounts.
via Pocket http://ift.tt/1lzctCE
My colleague, Silviu Stahie, wrote an interesting article earlier today, regarding the “ability” of the Ubuntu Linux operating system to store Wi-Fi passwords in plain text, “thanks” to the default design of the NetworkManager application, initially developed by Red Hat.
via Pocket http://ift.tt/1cHyYV6