Fake USB drive infects Mac and uploads files

Article at Quora.com Outlines a script called rubber ducky that infects a Mac computer and then uploads your documents directory to wherever the script tells it to. They have tested this  concept with a couple of scripts and methods. This means as we have mentioned before, One should be especially careful with plugging in unknown … Read more

Traffic lights hacked in Michigan

MIT Technology Review University of Michigan  was given permission and was able to hack traffic light systems And the traffic lights had unencrypted wireless communications, default passwords and a port on the system that is easy to attack. The MIT paper link Unfortunately this manufacturer did not pay too much attention to security. This is … Read more

31337 hacker tells how he owned Gamma

data.langly.fr has the post in English and very well written The hacker writes well and explains how he owned (penetrated) the website gamma-international.de, which redirects to finsupport.finfisher.com The hacker 31337 explains himself including how to stay anonymous, and not reveal who you are to the site that he attacked. He uses Google tricks including the … Read more

Need to decrypt your files from cryptolocker infection?

FireEye and FoxIT have a website to recover your files from an infection – we have an old blogpost  about Synology systems getting infected and encrypted.   Here is the website from FireEye and FoxIT: https://decryptcryptolocker.com/

Dont pick up stray USB hard drives

Another social engineering hacking method is to leave USB hard drives for unsuspecting people. NetworkWorld.com article goes into some details of why the USB hard drive is insecure and can be easily programmed with malware (malicious software). This malware can be designed to inject itself into your computer, or a server. and without you knowing it … Read more