Stories by Lucian Constantin

Attackers install DDoS bots on Amazon cloud, exploiting Elasticsearch weakness

Attackers are exploiting a vulnerability in distributed search engine software Elasticsearch to install DDoS malware on Amazon and possibly other cloud servers.

By Lucian Constantin | 28 July, 2014 23:44

Tags: amazon, intrusion, security, Exploits / vulnerabilities, kaspersky lab, malware

Russian government offers money for identifying Tor users

The Russian Ministry of Interior is willing to pay 3.9 million roubles, or around US$111,000, for a method to identify users on the Tor network.

By Lucian Constantin | 26 July, 2014 01:15

Tags: The TOR Project, Government use of IT, online safety, security, Exploits / vulnerabilities, government, privacy

Thousands of sites compromised through WordPress plug-in vulnerability

A critical vulnerability found recently in a popular newsletter plug-in for WordPress is actively being targeted by hackers and was used to compromise an estimated 50,000 sites so far.

By Lucian Constantin | 25 July, 2014 02:06

Tags: online safety, security, Sucuri, Exploits / vulnerabilities, malware

Hackers steal user data from the European Central Bank website, ask for money

Hackers have stolen user contact information, including email addresses and phone numbers, from the website of the European Central Bank and attempted to extort money from the institution.

By Lucian Constantin | 24 July, 2014 22:38

Tags: Tripwire, security, data breach, data protection, AppRiver, fraud, privacy, European Central Bank

File-encrypting Android ransomware 'Simplocker' targets English-speaking users

A ransomware threat that encrypts files stored on the SD memory cards of Android devices has been updated to target English-speaking users with FBI-themed alerts.

By Lucian Constantin | 23 July, 2014 23:46

Tags: mobile applications, Android OS, security, mobile security, eset, mobile, malware

Tor Project working to fix weakness that can unmask users

Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users.

By Lucian Constantin | 23 July, 2014 01:06

Tags: Carnegie Mellon University, The TOR Project, online safety, security, encryption, Exploits / vulnerabilities, privacy

Open Wireless Router firmware aims for better router security, network performance

Advocacy group the Electronic Frontier Foundation wants to address the poor security track record of home routers with a new firmware project that will encourage users to share their Internet connection publicly by setting up guest Wi-Fi networks.

By Lucian Constantin | 22 July, 2014 03:58

Tags: networking hardware, online safety, security, Networking, routers, Exploits / vulnerabilities, Electronic Frontier Foundation, Independent Security Evaluators

Stealthy ransomware 'Critroni' uses Tor, could replace Cryptolocker

Cybercriminals are spreading a new file-encrypting ransomware program that's more powerful and resilient than Cryptolocker, a threat recently shut down by the U.S. Department of Justice.

By Lucian Constantin | 22 July, 2014 01:14

Tags: U.S. Department of Justice, Webroot, security, encryption, malware

Home router security to be tested in upcoming hacking contest

Researchers are gearing up to hack an array of different home routers during a contest next month at the Defcon 22 security conference.

By Lucian Constantin | 19 July, 2014 02:07

Tags: intrusion, online safety, security, Networking, routers, Exploits / vulnerabilities, Electronic Frontier Foundation, Independent Security Evaluators, networking hardware

Romanian gang used malware to defraud international money transfer firms

Romanian and French authorities have dismantled a cybercriminal network that infected computers at money transfer outlets across Europe and used them to perform illegal transactions.

By Lucian Constantin | 18 July, 2014 23:55

Tags: Europol, security, legal, Identity fraud / theft, fraud, cybercrime, malware

Emergency vBulletin patch fixes dangerous SQL injection vulnerability

Developers of the popular vBulletin Internet forum software have issued emergency patches Wednesday in order to fix a SQL injection vulnerability that could allow attackers to read and manipulate information stored in the databases of vBulletin-based sites.

By Lucian Constantin | 18 July, 2014 00:07

Tags: patches, security, patch management, vBulletin Solutions, Exploits / vulnerabilities

Vulnerability exposes some Cisco home wireless devices to hacking

Nine of Cisco's home and small office cable modems with router and wireless access point functionality need software updates to fix a critical vulnerability that could allow remote attackers to completely compromise them.

By Lucian Constantin | 17 July, 2014 22:13

Tags: networking hardware, patches, Cisco Systems, intrusion, security, Networking, Exploits / vulnerabilities

SSL Blacklist project exposes certificates used by malware

Botnet tracking outfit has launched a project to list SSL (Secure Sockets Layer) certificates used by some malware programs to hide their communications.

By Lucian Constantin | 17 July, 2014 01:16

Tags: security,, encryption, pki, malware

Overreliance on the NSA led to weak crypto standard, NIST advisers find

The National Institute of Standards and Technology needs to hire more cryptographers and improve its collaboration with the industry and academia, reducing its reliance on the U.S. National Security Agency for decisions around cryptographic standards.

By Lucian Constantin | 16 July, 2014 03:05

Tags: National Institute of Standards and Technology, Government use of IT, National Security Agency, security, regulation, encryption, government

New banking malware 'Kronos' advertised on underground forums

A new Trojan program designed to steal log-in credentials and other financial information from online banking websites is being advertised to cybercriminal groups on the underground market.

By Lucian Constantin | 15 July, 2014 04:33

Tags: online safety, Tripwire, security, IBM, Malwarebytes, spyware, fraud, kaspersky lab, malware, Trusteer

Top Whitepapers

Twitter Feed

Featured Whitepapers