New style of attack – Tabnapping

Aza Raskin describes a new style of attack If you also click on his link, you will see it in action. The initial Aza Raskin page:   (I am copying and pasting the screenshots here)   Once you click on a page it changes your tab to a “Gmail tab” favicon (the little icon on … Read more

After CC Breach hackers now changing your PIN# on the stolen cards

KrebsonSecurity has the story again:   “KrebsOnSecurity also heard from an employee at a much larger bank on the West Coast that lost more than $300,000 in two hours today to PIN fraud on multiple debit cards that had all been used recently at Home Depot. The manager said the bad guys called the customer service folks … Read more

Target hacked in 11 steps – 4 should’ve been stopped

CIO  magazine has the 11 steps of the hack Step 3 exploit  a web vulnerability should have been remediated, although the hackers were in the network they would have had a harder time to attack. Step 5-6 Stealing a token from Domain admins , although the password hash may have been removed somehow, the Domain … Read more

Fake USB drive infects Mac and uploads files

Article at Quora.com Outlines a script called rubber ducky that infects a Mac computer and then uploads your documents directory to wherever the script tells it to. They have tested this  concept with a couple of scripts and methods. This means as we have mentioned before, One should be especially careful with plugging in unknown … Read more

Traffic lights hacked in Michigan

MIT Technology Review University of Michigan  was given permission and was able to hack traffic light systems And the traffic lights had unencrypted wireless communications, default passwords and a port on the system that is easy to attack. The MIT paper link Unfortunately this manufacturer did not pay too much attention to security. This is … Read more