Command & Control Traffic From Inside Network

It seems everyone should be looking for Command and Control traffic  from inside the network (updated on 04/01/2016)   What does Command and Control mean? It is the last process in the hacking cycle: As we have pointed out: SVAPE & C   Scan, Vulnerability Analysis, Penetrate Exploit & Control from other posts  http://www.fixvirus.com/svapec/ Our … Read more

Lenovo Made Big Cybersecurity Mistake & now Komodia

Here is the underlying Lenovo problem: http://www.kb.cert.org/vuls/id/529496  ” Komodia Redirector with SSL Digestor installs non-unique root CA certificates and private keys, making systems broadly vulnerable to HTTPS spoofing” And unfortunately this Komodia Redirector is inside a Lenovo software installation (Superfish) Here is a Techworld  story: http://www.techworld.com/news/security/lenovo-not-alone-in-suffering-from-superfish-security-flaw-3598898/  which also discusses  the problem both in Lenovo systems: “ Security researchers … Read more

Hackers hacked a Foscam Baby Monitor

Computerworld has the story: http://www.computerworld.com/article/2878741/hacker-hijacks-wireless-foscam-baby-monitor-talks-and-freaks-out-nanny.html?utm_source=dlvr.it&utm_medium=twitter#tk.rss_all    We have posted about this before Jun11, 2014 http://oversitesentry.com/what-if-your-new-gadget-gets-hacked-even-your-countertop-or-toilet/ The creepy hacker said some words to the nanny and caused the nanny to turn off the webcam. There seems to be a sad theme here as well as our post(Nov16) of regular webcams (not just babycams) http://oversitesentry.com/change-default-passwords-online-cams/ It seems it … Read more

Ghost: glibc vulnerability CVE2015-0235

How dangerous is it?  It is an inherent Linux glibc vulnerability. RedHat is discussing it on their articles page – has the CVE number 2015-0235 https://access.redhat.com/articles/1332213 It is nicknamed “Ghost” due to the ghostbyname() function calls in the glibc library, specifically: “GHOST is a ‘buffer overflow’ bug affecting the gethostbyname() and gethostbyname2() function calls in the … Read more

What does state-of-art Spear Phishing Look Like?

Hackread has the story: http://hackread.com/outlook-web-app-phishing-page-on-russian-site/  screenshot from fake page as on Hackread That looks like a standard OWA access panel right?  Except that it is actually on a Russian site designed to steal your credentials.   If you received an email stating: “check your email with this link, must see document ” Then your click … Read more