Fighting all the things that threaten privacy, security and our Internet
See all
Members (3,166)
Darren Kitchen's profile photo
Robb Dunphy's profile photo
Shannon Morse's profile photo
Abdushakur Arina Jamwa's profile photo
0x NULL's profile photo
Adam May's profile photo
Adam Lewis's profile photo
Adam Gilman's profile photo
AJ Hushen's profile photo
AJ W (IronHead)'s profile photo
Achille “EgoCogito” Talon's profile photo
Aaron Ackerman's profile photo
Aaron Bay's profile photo
Aaron Clark's profile photo
Adam Goddard's profile photo
Aaron Hoyt's profile photo
Aaron King's profile photo
Abdullah M. Alkelabi's profile photo
Adam Pryke's profile photo
Adam Prescott's profile photo
Adam Faircloth's profile photo
Abel Wike's profile photo
Adam Boss's profile photo
Aaron Silver's profile photo

Stream

Join this community to post or comment

rami ram

Discussion  - 
1
1
Loick PELET's profile photo
Add a comment...
 
 
SPEAR is Back a 18-year-old vulnerability in Windows.
SPEAR, the research team at Cylance, has discovered new attack vectors for an 18-year-old vulnerability in Windows Server Message Block (SMB). The updated attack vector, called Redirect to SMB, impacts products from Microsoft, Apple, Adobe, Symantec, Box, Oracle, and more.
View original post
2
1
Kevin Hiebert's profile photo
Add a comment...

rami ram

Discussion  - 
 
Summary:A new executive order is said to have made it illegal to donate to Edward Snowden's fund, which didn't go down so well with one good-spirited community.
5
1
Sean Guidry (CYPH3R)'s profile photo
Add a comment...

rami ram

Free and Open Internet  - 
 
A bipartisan bill introduced in Congress Tuesday would end government spying on ordinary Americans by repealing the Patriot Act as advocates rush to reauthorize the law's most controversial provisions before a June deadline. The Surveillance State...
5
Chris Stith's profile photo
 
Well, it would remove some of the authorization for the spying. We'd have to get that mythical open administration in place to be sure the actual spying stopped.
Add a comment...

rami ram

Discussion  - 
 
Global technology giants like Google and Microsoft have teamed up with civil liberties groups to get Congress to change the country’s spying laws.
1
Add a comment...

rami ram

Privacy  - 
 
Despite being the most widely used authentication system of the digital world, Password based authentication have their own set of issues and challenges. Whether it be the compromised security situation due to leakage and brute-forcing of passwords or be it the inconvenience of memorizing passwords and the hassle to input them every time for access. Microsoft has tried to tackle the issue in Windows 8 by using Picture Login Feature, their are als...
1
Add a comment...

rami ram

Privacy  - 
 
Android IMSI-Catcher Detector. Build Status Development Status GooglePlay CoverityScan. Android-based project to detect and avoid fake base stations (IMSI-Catchers) in GSM/UMTS Networks. Feel free to read the Press Releases about us, spread the word with our Media Material and help us solving ...
6
4
Joshua Loscar's profile photoDean Ayres's profile photo
Add a comment...

rami ram

Discussion  - 
 
For the remaining folks that haven't given up on Yahoo!'s email, news from SxSW may be a vindication of sorts. Thumbing its nose at the NSA, Yahoo! has released the end-to-end email encryption source to be used in its new browser plugin.
10
2
Ryan Gibson's profile photoShawn S's profile photo
Add a comment...
 
n00bs CTF Labs by Infosec Institute - 15 mini challenges that have bounties for hackers out there
n00bs CTF (Capture the Flag) Labs is a web application presented by Infosec Institute. It has 15 mini Capture the Flag challenges intended for beginners an
2
Add a comment...

About this community

Threat Wire by Hak5 is a YouTube show covering the security and privacy issues threatening our Internet. From breaches and policies to social networks and censorship, Threat Wire takes the practical and tinfoil hat angles to dispel fear, uncertainty and doubt.

rami ram

Discussion  - 
 
Sending phishing emails to 10 employees will get hackers inside corporate gates 90% of the time
1
Jose Pelaez's profile photo
 
It took a study to figure that one out? 
Add a comment...

rami ram

Discussion  - 
 
Hours after police removed an illicit bust of Edward Snowden from its perch in a Brooklyn park on Monday, artists replaced it with a hologram.
2
Add a comment...

rami ram

Discussion  - 
 
To keep its code-breaking prowess, the National Security Agency must recruit scores of the brightest students in math and computer science each year. The Snowden revelations are hurting those efforts.
3
Chris Pipher's profile photo
 
Oh now now there are plenty of evil people left in the world.

Because spy movies are cool, I Wana be like mike.
Add a comment...

rami ram

Security  - 
 
Exploits pluck passwords and other sensitive data out of encrypted data streams.
1
Add a comment...

rami ram

Security  - 
 
Dangerous 'Vawtrak Banking Trojan' Harvesting Passwords Worldwide

Security researcher has discovered some new features in the most dangerous Vawtrak, aka Neverquest, malware that allow it to send and receive data through encrypted favicons distributed over the secured Tor network.

The researcher, Jakub Kroustek from AVG anti-virus firm, has provided an in-depth analysis (PDF) on the new and complex set of features of the malware which is considered to be one of the most dangerous threats in existence.

Vawtrak is a sophisticated piece of malware in terms of supported features. It is capable of stealing financial information and executing transactions from the compromised computer remotely without leaving traces. The features include videos and screenshots capturing and launching man-in-the-middle attacks.

HOW VAWTRAK SPREADS ?
AVG anti-virus firm is warning users that it has discovered an ongoing campaign delivering Vawtrak to gain access to bank accounts visited by the victim and using the infamous Pony module in order to steal a wide range of victims’ login credentials.

 The Vawtrak Banking Trojan spreads by using one of the three ways:

    Drive-by download – spam email attachments or links to compromised sites
    Malware downloader – like Zemot or Chaintor
    Exploit kit – like as Angler Exploit Kit

 LATEST FEATURES
According to the researcher, Vawtrak is using the Tor2Web proxy to receive updates from its developers.

    "Of particular interest from a security standpoint is that by using Tor2web proxy, it can access update servers that are hosted on the Tor hidden web services without installing specialist software such as Torbrowser," Kroustek says. "Moreover, the communication with the remote server is done over SSL, which adds further encryption."

The latest Vawtrak sample uses steganography to hide update files within favicons in order to conceal the malicious downloads. Favicons are the small images used by the websites to add icon to website bookmarks and browser tabs.

Once executed in the victim’s machine, Vawtrak performs the following actions:

    Disables antivirus protection.
    Inject custom code in a user-displayed web pages (this is mostly related to online banking)
    Steals passwords, digital certificates, browser history, and cookies.
    Surveillance of the victim (key logging, taking screenshots, capturing video)
    Creates a remote access to a user’s machine (VNC, SOCKS)
    Automatic updating.

Vawtrak supports three major browsers to operate in – Internet Explorer, Firefox, and Chrome. It also supports password stealing from the other browsers.

AFFECTED COUNTRIES
Based on their statistics, Vawktrak is infecting banking, gaming and social network users mainly across the countries including United Kingdom, the United States, and Germany. Although, users in Australia, New Zealand, and across Europe are also affected.

AVG concluded following their analysis of the malware that "Vawtrak is like a Swiss Army knife for its operators because of its wide range of applications and available features."
1
Add a comment...

rami ram

Privacy  - 
 
Former U.S. intelligence analyst Edward Snowden has accused the U.S. National Security Agency of routinely passing private, unedited communications of Americans to Israel, an expert on the intelligence agency said Wednesday.
4
1
Robb Dunphy's profile photoAlan Hacker's profile photo
 
This is hardly surprising to be honest considering the US and Israels relationship.
Add a comment...
 
New Cryptolocker variant targets gamers - encrypts game files

Remember Cryptolocker, that nasty little program that encrypts your files and then demands expensive bitcoins for your files' decryption? While it is still making the rounds on the internet, a new version of the malware has surfaced, and it is reportedly targeting gamers.
According to a report by Bromium Labs, the new variant of the Cryptolocker ransomware, which goes by the name TeslaCrypt, aims to extort money from gamers by making them pay to unlock game files which they already own. The malware apparently impacts data files of over 20 games, and is distributed through a drive-by download attack from a website which then redirects an unknowing user to the Angler exploit kit by utilizing a Flash clip. The compromised website is purportedly running under WordPress, where a malware attack has also been hosted before. 

The malware targets 185 file extensions, and encrypts game saves, maps, mods, replays, and other user-generated game content, which cannot be retrieved if a game is reinstalled. The list of games that are affected by the malware program includes Call of Duty, StarCraft, Diablo, Fallout, Minecraft, Assassin's Creed, Half Life 2, and Bioshock 2, among others. Digital game distribution platform Steam is allegedly targeted, as well as game development software such as RPG Maker, Unity3D, and Unreal Engine.
1
1
Fervent Dissent's profile photo
Add a comment...

rami ram

Privacy  - 
 
National Security Agency whistleblower Edward Snowden spent the weekend popping up at tech conferences across the globe, accusing governments of falsely equating terrorism with mass surveillance and c
4
Add a comment...

rami ram

Privacy  - 
 
A group of Canadian researchers and journalists have built the world’s first fully-indexed online archive of Edward Snowden’s leaked NSA surveillance documents.
8
2
Jose Villasenor's profile photoRyan Gibson's profile photo
Add a comment...