Home attackers
 

Keywords :   


Tag: attackers

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

2014-11-03 12:46:13| Wireless - Topix.net

Computers housing the world's most sensitive data are usually "air-gapped" or isolated from the internet. They're also not connected to other systems that are internet-connected, and their Bluetooth feature is disabled, too.

Tags: data mobile radio phones

 

Attackers use NTP reflection in huge DDoS attack

2014-02-11 20:46:46| InfoWorld: Top News

Attackers abused insecure Network Time Protocol servers to launch what appears to be one of the largest DDoS (distributed denial-of-service) attacks ever, this time against the infrastructure of CloudFlare, a company that operates a global content delivery network. The attack was revealed Monday on Twitter by Matthew Prince, CloudFlare's CEO, who said that it's "the start of ugly things to come" because "someone's got a big, new cannon."

Tags: huge attack reflection ntp

 
 

Target says attackers used stolen vendor credentials to gain access

2014-01-30 14:24:12| InfoWorld: Top News

Target said Wednesday that intruders accessed its systems by using credentials "stolen" from a vendor, one of the first details the retailer has revealed about how hackers got inside. The vendor was not identified. A Target spokeswoman said she had no further details to share.

Tags: access target gain vendor

 

Attackers exploited ColdFusion vulnerability to install Microsoft IIS malware

2013-12-17 13:30:45| InfoWorld: Top News

Attackers exploited a vulnerability in Adobe ColdFusion to install data-stealing malware that works as a module for Microsoft's Internet Information Services (IIS) Web server software.Researchers from security firm Trustwave recently reported they've identified IIS (Internet Information Server) Web servers infected with malicious IIS modules designed to steal information submitted by users on websites hosted on those servers.

Tags: microsoft install iis vulnerability

 

Attackers exploited ColdFusion vulnerability to install Microsoft IIS malware

2013-12-16 20:14:36| InfoWorld: Top News

Attackers exploited a vulnerability in Adobe ColdFusion to install data-stealing malware that works as a module for Microsoft's IIS (Internet Information Services) Web server software. Researchers from security firm Trustwave recently reported they've identified IIS (Internet Information Server) Web servers infected with malicious IIS modules designed to steal information submitted by users on websites hosted on those servers.

Tags: microsoft install iis vulnerability

 

Sites : [1] [2] [3] [4] [5] [6] [7] next »