Categories » Vulnerabilities

How Hackers Could Slam on Your Car’s Brakes – 1 August 2014

1 August 2014 by Erica Fink – “CNN Money” How Hackers Could Slam on Your Car’s Brakes. Researchers have released a list of the most hackable vehicles among 20 different models compared. The study looked at the technical configurations of the cars to … Continue reading

StubHub Wasn’t Hacked. But Its Users Were.- 24 July 2014

24 July 2014 by Andrea Peterson – “The Washington Post” StubHub Wasn’t Hacked. But Its Users Were. Recent reports of ticket resale Internet company StubHub being hacked are misleading. Though their user’s data was compromised, this was not another case of … Continue reading

Summary of 2013 Malware Development

HackSurfer just released a summary on malware development for 2013 based on the formal report from Panda Labs. Here are some of the key points from the summary: Almost 32% of computers across the world found infected with malware. There were … Continue reading

Mask/Careto Unmasked, Shadowy Spanish Spybots Slink into Sunset

Amid continuous revelations of a variety of “Advanced Persistent Threat” (APT) hacking operations sponsored by nation states–among them Flame/Gauss/Duqu/Stuxnet, Red October, Comment Crew, Shamoon, Icefog and Dark Seoul– the major global players such as the US, Russia, and China have … Continue reading

The Syrian Electronic Army: Mediums of Disinformatics

“We are just Syrian youths who want to defend their country against the media campaign that is full of lies and fabricated news reports” The Syrian Electronic Army (SEA) most likely began at least in part as an outgrowth of … Continue reading

Successor to Blackhole Exploit Kit May Take Years to Emerge

The arrest of Paunch shut off the flow of updates to the highly popular crimeware infastructure support tool, the Blackhole Kit. Since then there have been a number of contenders for the lucrative crown. A new article at Threatpost speaks … Continue reading

DARPA is Trying to Turn Cyberwar Into Child’s Play

DARPA, as expected, is coming up with many new and inventive ways of trying to rethink the cyber security challenges that DOD is plagued with. First they have developed a series of free computer and mobile app based games that, … Continue reading

NASA’s New Program: Robots

NASA developed an advanced robot known as Valkyrie that competed in DARPA’s 2013 Robotics Challenge Trial. DARPA hosted the robot challenge at the Florida’s Homestead Miami Speedway this past December. Eight teams were selected to participate in a series of … Continue reading

FBI Asking Tech Vendors to Install Backdoors

Wickr’s Nico Sell has disclosed in a PCMag article that she was approached by the FBI at a security conference, and that an agent casually asked if she would be willing to install a backdoor for them in her company’s … Continue reading

Cyber: The Achilles’ Heel of Drones?

As Unmanned Aerial Vehicles (UAVs) continue to advance and play an ever growing role in modern warfare, could cyber vulnerabilities pose a potential pitfall? With drone technology rapidly advancing and allowing for the production of truly autonomous UAVs, concerns over … Continue reading

How I Learned to Stop Worrying and Love the Spam

Here at MCySec we receive a decent amount of spam every day, much like anyone who runs a blog with open commenting. All of this spam has been stopped by WordPress and Akismet from being displayed on our pages, This … Continue reading

Red October(?) Evolves, Hits Finnish Foreign Ministry

The Red October RAT (Remote Access Tool) which has been extensively analyzed by Kaspersky appears to have continued its development. The Finnish Foreign Ministry has disclosed that they were the victims of a penetration attack going on over four years. … Continue reading

The Malware of Things

A pair of dueling intelligence exploitation revelations have given the ongoing Snowden releases a run for their money. The first is the allegation that Russia provided poisoned gifts to delegates at the G20 summit. The complementary USB sticks and telephone … Continue reading

Google Rolls Out New “Digital Attack Map” Tool

Google has unveiled a new tool that allows real-time and historical display of digital attack traffic. Foreign Policy has done an excellent write-up on the new tool here. The tool gives you the ability to see ongoing DDOS and scanning … Continue reading

“Paunch” Punches Out, Blackhole Kit Hits the Rocks

The Blackhole Exploit Kit, one of the more popular methods of delivering criminal malware to unsuspecting users, has run into a number of difficulties in the last few days. The leading crimeware kit, which has usually been updated as often … Continue reading

QUANTUM and FOXACID; NSA:TAO MiTMing TOR Users

Bruce Schneier has recently published a series of articles on the ways that the users of the TOR network and others have been targeted with exploits by the NSA’s Tailored Access Operations group. He has also posted a full explanation … Continue reading

Tiny Botnet Makes Big Impact on Background Check Companies, ID Thieves Profit.

Security Researcher Brian Krebs has conducted an investigation of a number of identity theft portals active on the internet, where various ne’er-do-wells were able to purchase the personal information (social security numbers and full background check information) of anyone they … Continue reading