HackDig : Dig high-quality web security articles for hackers

VPNs: should you use them?

We are going to talk today about something you’ve likely heard of before: VPNs, or Virtual Private Networks. We at Malwarebytes have delved into these tools in greater depth, and we’ve literally discussed them on the digital airwaves. But we want to answer a question we’ve been getting more and more. Folks aren’t as curious about what a VPN is anymore, as
Publish At:2020-06-16 16:29 | Read:787 | Comments:0 | Tags:Privacy fail close fail open internet service provider ISP k

DDoS Attacks and IoT Exploits: New Activity from Momentum Botnet

by Aliakbar Zahravi  We recently found notable malware activity affecting devices running Linux, a platform that has battled numerous issues just this year. Further analysis of retrieved malware samples revealed that these actions were connected to a botnet called Momentum (named for the image found in its communication channel). We found new details on the
Publish At:2019-12-16 14:35 | Read:1657 | Comments:0 | Tags:Botnets Exploits Internet of Things botnet IOT Momentum rout

Number of WordPress Attacks powered by compromised routers is rapidly dropping

Experts from security firm WordFence reported a rapid reduction of WordPress attacks originating from hundreds of ISPs worldwide. Experts at the security firm Wordfence a few weeks ago reported that tens of thousands of flawed routers from dozens of ISPs worldwide were recruited in a botnet used to power several types of attacks against WordPress websites. H
Publish At:2017-05-03 14:15 | Read:4229 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Internet of Things botnet

Wireless Routers: First Line of Defense

Almost everything you read or hear about routers includes a sentence or two about router security. The focus is generally on this essential piece of hardware as the first line of defense in an internet-connected world. Many medium-sized companies and large corporations take this into account when they purchase and set up their network infrastructure.They ten
Publish At:2017-03-20 14:30 | Read:6046 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Network Ro

Efficient Wi-Fi Phishing Attacks: Would You Fall for That?

In recent years, Wi-Fi networks are usually secured with the Wi-Fi Protected Access II (WPA2), a security protocol which leverages a strong cryptographic hash function (PBKDF2 with the network’s ESSID as salt) to protect the pre-shared key (PSK).Breaking into a WPA-2 network can be a great challenge during a penetration test. A modern GPU that is able
Publish At:2017-01-05 03:15 | Read:5131 | Comments:0 | Tags:Featured Articles Security Awareness encryption password Phi

Switcher: Android joins the ‘attack-the-router’ club

Recently, in our never-ending quest to protect the world from malware, we found a misbehaving Android trojan. Although malware targeting the Android OS stopped being a novelty quite some time ago, this trojan is quite unique. Instead of attacking a user, it attacks the Wi-Fi network the user is connected to, or, to be precise, the wireless router that serves
Publish At:2016-12-28 11:20 | Read:5842 | Comments:0 | Tags:Blog Mobile DNS Google Android Mobile Malware Router

How “Peter Parker’s” Mirai Variant Took Down 900,000 Routers

What happens when service providers issue routers with remotely exploitable flaws?This weekend, we saw a glimpse of what is possible when attackers attempted to load Mirai-based malware on routers through a vulnerability in an exposed remote management protocol. Although the attackers probably failed in their ultimate goal of creating a large botnet, the eff
Publish At:2016-11-30 16:10 | Read:5722 | Comments:0 | Tags:Internet of Things botnet IoT malware Mirai Router

New wave of Mirai attacking home routers

Background Starting from yesterday, many DSL customers in Germany were reporting problems with their routers, which weren’t able to connect to their ISP anymore or that the internet connection was very weak. Today we saw news, that a malicious attack could be the reason for this widespread problem. Fortunately we got some more technical details from us
Publish At:2016-11-29 03:45 | Read:5154 | Comments:0 | Tags:Blog Botnets IoT Linux Mirai Router

Cisco Founders Forum: One creative way to keep & energize talent

The tech industry brims with examples of bright entrepreneurs who have struck it big by selling their startups and then hightailing it out of those larger companies once contractually eligible so that they can pursue their next venture.So what the heck is Matt Cutler still doing at Cisco three years after selling his mobile collaboration startup to the n
Publish At:2016-11-16 15:30 | Read:6388 | Comments:0 | Tags:Leadership and Management Careers/Staffing Router Security C

Security Hygiene for Dorm Life

Going back to school, especially college, is a fun time of year. One of the best experiences, by far, is living with other people in a dorm or private shared housing. You can make awesome friends, have amazing parties, and make excellent memories.It’s important to note in these shared living situations that hygiene is incredibly important. You don̵
Publish At:2016-09-06 01:40 | Read:4357 | Comments:0 | Tags:Featured Articles Security Awareness clickbait hygiene malwa

Linux.PNScan Trojan is back to compromise routers and install backdoors

The Linux Trojan Linux.PNScan is back and it is actively targeting routers based on x86 Linux in an attempt to install backdoors on them. Yesterday I wrote about a new Linux Trojan dubbed Linux.Rex.1, a new Linux malware that is capable of self-spreading and creating a peer-to-peer botnet, now experts from Malware Must Die discovered a new strain of malware
Publish At:2016-08-25 17:25 | Read:5336 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Internet of Things Malware

Juniper patches high-risk flaws in Junos OS

Juniper Networks has fixed several vulnerabilities in the Junos operating system used on its networking and security appliances, including a flaw that could allow hackers to gain administrative access to affected devices.The most serious vulnerability, rated 9.8 out of 10 in the Common Vulnerability Scoring System, is located in the J-Web interfa
Publish At:2016-07-14 12:35 | Read:3443 | Comments:0 | Tags:Security Networking Router Patches Operating Systems

Turris Omnia Security Project protects home network users

The non-profit security research Turris Omnia project originating from the Czech Republic focuses on safety of SoHo users. The non-profit security research project originating from the Czech Republic, which focuses on safety of SoHo users, has recently entered a new phase. This project, whose users include such celebrities as
Publish At:2015-11-30 05:55 | Read:4620 | Comments:0 | Tags:Breaking News Hacking home network home routers Router SOHO

IP was Middle School, Named Data Networking is College

Much of the Named Data Networking (NDN) project codebase is still at the Version zero-dot-something level. But things are nevertheless starting to get real for this content-centric architecture designed to blast past today’s host-based and point-to-point Internet scheme to one more suited for accessing applications across hugely scalable networks that ar
Publish At:2015-10-08 20:25 | Read:4983 | Comments:0 | Tags:Network Management Router Security Applications Internet of

SYNful Knock: Opening the Door on Industry Ignorance

I’ve always been a big fan of language. I’m a stickler for proper usage of the oxford comma, I believe that recent additions to the Oxford English Dictionary are contributing to the decay of our society, and I’m a big fan of using proper language to say what you mean. This final point is the one that I’d like to address with this blog post and SYNful Knock h
Publish At:2015-09-22 16:55 | Read:4385 | Comments:0 | Tags:IT Security and Data Protection backdoor FireEye Router SYNf


Tag Cloud