Page 32 of 32 FirstFirst ... 22242526272829303132
Results 776 to 790 of 790
  1. #776
    Thailand Expat
    OhOh's Avatar
    Join Date
    Jul 2010
    Last Online
    17-07-2019 @ 10:57 PM
    Location
    Where troubles melt like lemon drops
    Posts
    17,525
    Quote Originally Posted by harrybarracuda View Post
    You registered to Teakdoor witha real email account?
    Yea a "real email account".

    How many "real email accounts" have you had in the past 20 years?

  2. #777
    disturbance in the Turnip baldrick's Avatar
    Join Date
    Apr 2006
    Last Online
    Today @ 10:54 PM
    Location
    Heidleberg
    Posts
    21,402
    Quote Originally Posted by OhOh View Post
    Yea a "real email account".
    TwistingHarrysTitties@gmail.com ?

  3. #778
    Member
    harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    Today @ 10:54 PM
    Posts
    59,231

  4. #779
    disturbance in the Turnip baldrick's Avatar
    Join Date
    Apr 2006
    Last Online
    Today @ 10:54 PM
    Location
    Heidleberg
    Posts
    21,402
    er ...aol.com

  5. #780
    Member
    harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    Today @ 10:54 PM
    Posts
    59,231
    Quote Originally Posted by baldrick View Post
    er ...aol.com
    He definitely qualifies as an AOL.


  6. #781
    Member
    harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    Today @ 10:54 PM
    Posts
    59,231
    Patch! Patch! Patch!

    Two critical vulnerabilities in Microsoft's NTLM authentication protocol consisting of three logical flaws make it possible for attackers to run remote code and authenticate on machines running any Windows version.

    Following Preempt’s responsible disclosure of the vulnerabilities found in NTLM, Microsoft has issued security advisories and patches for the CVE-2019-1040 Windows NTLM Tampering Vulnerability and the CVE-2019-1019 Microsoft Windows Security Feature Bypass Vulnerability as part of the Patch Tuesday updates published today.

    https://www.bleepingcomputer.com/new...o-rce-attacks/





  7. #782
    Member
    harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    Today @ 10:54 PM
    Posts
    59,231
    Never give your phone to a chinky copper...

    https://medium.com/@fs0c131y/mfsocke...l-58e8850c3de4

  8. #783
    Member
    harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    Today @ 10:54 PM
    Posts
    59,231
    New MacOS Malware Discovered

    A wave of new MacOS malware over the past month includes a zero-day exploit and other attack code.


    A wave of malware targeting MacOS over the past month has raised the profile of the operating system once advertised as much safer than Windows. The newest attack code for the Mac includes three pieces of malware found in June — a zero-day exploit, a package that includes sophisticated anti-detection and obfuscation routines, and a family of malware that uses the Safari browser as an attack surface.

    The zero-day exploit, dubbed
    OSX/Linker by researchers at Intego who discovered it, takes advantage of a vulnerability in MacOS Gatekeeper — the MacOS function that enforces code-signing and has the ability to limit program execution to properly sign code from trusted publishers.


    The
    MacOS X GateKeeper Bypass vuln used in OSX/Linker was first discovered in February 2019 by independent researcher Filippo Cavallarin, who says that he notified Apple of the finding. After a 90-day disclosure deadline passed, Cavallarin publicly disclosed the vulnerability on May 24.

    https://www.darkreading.com/attacks-breaches/new-macos-malware-discovered-/d/d-id/1335135

  9. #784
    Member
    harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    Today @ 10:54 PM
    Posts
    59,231
    If you want to block chinky, russky and mad mullah spies, you can use these links to add the appropriate rules in your firewall:

    https://lite.ip2location.com/china-ip-address-ranges

    https://lite.ip2location.com/russian...address-ranges

    https://lite.ip2location.com/iran-is...address-ranges

    I would add North Korea but they do all their shit remotely.

  10. #785
    Thailand Expat
    Klondyke's Avatar
    Join Date
    Aug 2014
    Last Online
    Today @ 10:38 PM
    Posts
    4,876
    ^If it is so easy, so why the US election gone so wrong?

  11. #786
    Member
    harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    Today @ 10:54 PM
    Posts
    59,231
    Fucking chinkies, at it again.


    As many as 25 million Android phones have been hit with malware that replaces installed apps like WhatsApp with evil versions that serve up adverts, cybersecurity researchers warned Wednesday.


    Dubbed Agent Smith, the malware abuses previously-known weaknesses in the Android operating system, making updating to the latest, patched version of Google's operating system a priority, Israeli security company Check Point said.

    Most victims are based in India, where as many as 15 million were infected. But there are more than 300,000 in the U.S., with another 137,000 in the U.K., making this one of the more severe threats to have hit Google's operating system in recent memory.


    The malware has spread via a third party app store 9apps.com, which is
    owned by China’s Alibaba, rather than the official Google Play store. Typically, such non-Google Play attacks focus on developing countries, making the hackers' success in the U.S. and the U.K. more remarkable, Check Point said.


    Whilst the replaced apps will serve up malicious ads, whoever's behind the hacks could do worse, Check Point warned in a blog. "Due to its ability to hide it’s icon from the launcher and impersonates any popular existing apps on a device, there are endless possibilities for this sort of malware to harm a user’s device," the researchers wrote.


    They said they’d warned Google and the relevant law enforcement agencies. Google hadn't provided comment at the time of publication.

    Typically the attack works as following: users download an app from the store - typically photo utility, games or adult themed apps (one called Kiss Game: Touch Her Heart is advertised with a cartoon of a man kissing a scantily clad woman). This app then silently installs the malware, disguised as a legitimate Google updating tool. No icon appears for this on the screen, making it even more surreptitious. Legitimate apps - from WhatsApp to the Opera browser and more - are then replaced with an evil update so they serve the bad ads. The researchers said the ads themselves weren't malicious per se. But in a typical ad fraud scheme, every click on an injected advert will send money back to the hackers, as per a typical pay-per-click system.


    There's some indication that the attackers are considering moving to Google Play. The Check Point researchers said they'd found 11 apps on Google's store that contained a "dormant" piece of the hackers software. Google swiftly took those apps down.


    Check Point believes an unnamed Chinese company based in Guangzhou has been building the malware, whilst operating a business that helps Chinese Android developers promote their apps on overseas platforms.


    Alibaba hadn't responded to a request for comment on proliferation of malware on the 9apps platform at the time of publication.

    https://www.forbes.com/sites/thomasbrewster/2019/07/10/25-million-android-phones-infected-with-malware-that-hides-in-whatsapp/#705d465d4470

  12. #787
    Thailand Expat
    OhOh's Avatar
    Join Date
    Jul 2010
    Last Online
    17-07-2019 @ 10:57 PM
    Location
    Where troubles melt like lemon drops
    Posts
    17,525
    No gogle gaps or responses to be found by an ameristani regime publisher, how quaint

  13. #788
    Member
    harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    Today @ 10:54 PM
    Posts
    59,231
    Quote Originally Posted by OhOh View Post
    No gogle gaps or responses to be found by an ameristani regime publisher, how quaint
    No American would do it you dumb shit. They can be sued.

    Try that in Chinastan and hey presto! you're in a re-education camp or disappeared.

    Jaysus you're thick.

  14. #789
    disturbance in the Turnip baldrick's Avatar
    Join Date
    Apr 2006
    Last Online
    Today @ 10:54 PM
    Location
    Heidleberg
    Posts
    21,402
    if you are using any of the following extensions in your browser - uninstall them - all or your PMs is belong to the borg

    do not install extensions until you have seen them reviewed by trusted 3rd parties

    Fairshare Unlock, a Chrome extension for accessing premium content for free. (A Firefox version of the extension, available here, collects the same browsing data.)available from Mozilla’s add-ons store.
    SpeakIt!, a text-to-speech extension for Chrome.
    Hover Zoom, a Chrome extension for enlarging images.
    PanelMeasurement, a Chrome extension for finding market research surveys
    Super Zoom, another image extension for both Chrome and Firefox. Google and Mozilla removed Super Zoom from their add-ons stores in February or March, after Jadali reported its data collection behavior. Even after that removal, the extension continued to collect browsing behavior on the researcher’s lab computer weeks later.
    SaveFrom.net Helper a Firefox extension that promises to make Internet downloading easier. Jadali observed the data collection only in an extension version downloaded from the developer. He did not observe the behavior in the version that was previously
    Branded Surveys, which offers chances to receive cash and other prizes in return for completing online surveys.
    Panel Community Surveys, another app that offers rewards for answering online surveys.

    http://arstechnica.com/information-t...and-4m-people/

  15. #790
    Member
    harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    Today @ 10:54 PM
    Posts
    59,231
    So the old Russkies are after Tor as well.... no surprise really.

    SyTech, a contractor for the Federal Security Service of the Russian Federation (FSB) has been hacked, attackers stole data about internal projects.

    Attackers have hacked SyTech, a contractor for the Federal Security Service of the Russian Federation (FSB), and exfiltrated data about internal projects.

    According to the Russian media, SyTech has been working with FSB since 2009, in particular, they contributed to several projects for FSB unit 71330 and for fellow contractor Quantum. The company earned 40 million rubles ($635,000) from public contracts in 2018. The latest project is the development of Nalog-3 for the Main Scientific Innovation Implementation Center.

    “According to the data received, the majority of non-public projects of Sytech were commissioned by military unit No. 71330, which allegedly is part of the 16th directorate of the FSB of Russia.”
    states the website CrimeRussia.”This unit is engaged in electronic intelligence, experts form the International Center for Defense and Security in Tallinn believe.”


    Some of the research projects accessed by the hackers were
    for Russia’s intelligence service, including one for deanonymizing Tor traffic.

    On July 13, a hacker group named 0v1ru$ hacked into SyTech’s Active Directory server then compromised the entire infrastructure of the company, including JIRA instance.


    The hackers
    exfiltrated 7.5TB of data and defaced the website of the company by publishing “yobaface.”

    The hackers published images of the company’s servers on Twitter and also shared the data with another hacker crew known as Digital Revolution, that in 2018 breached the FSB
    contractor Quantum.

    https://securityaffairs.co/wordpress/88657/intelligence/fsb-contractor-sytech-hacked.html

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •