Computer security news, opinion, advice and research from anti-virus experts & New Technologies for Computer Security, Sharing the crazy for the betterment of online security

StoneDrill Disk Wiping Malware Found Targeting European Industries

StoneDrill Disk Wiping Malware Found Targeting European Industries
A new disk wiping malware has been uncovered targeting a petroleum company in Europe, which is quite similar to the mysterious disk wiper malware Shamoon that wiped data from 35,000 computers at Saudi Arabia's national oil company in 2012.Disk wiping malware has the ability to cripple any organization by permanently wiping out data from all hard drive and external storage on a targeted machine, causing great financial and reputational damage.Security researchers from Moscow-based antivirus pr…
Rate this blog entry:
Continue reading
134 Hits
0 Comments

Scientists Store an Operating System, a Movie and a Computer Virus on DNA

Scientists Store an Operating System, a Movie and a Computer Virus on DNA
Do you know — 1 Gram of DNA Can Store 1,000,000,000 Terabyte of Data for 1000+ Years.Just last year, Microsoft purchased 10 Million strands of synthetic DNA from San Francisco DNA synthesis startup called Twist Bioscience and collaborated with researchers from the University of Washington to focus on using DNA as a data storage medium.However, in the latest experiments, a pair of researchers from Columbia University and the New York Genome Center (NYGC) have come up with a new technique to st…
Rate this blog entry:
Continue reading
127 Hits
0 Comments

Database of 1.4 Billion Records leaked from World’s Biggest Spam Networks

Database of 1.4 Billion Records leaked from World’s Biggest Spam Networks
A database of 1.4 billion email addresses combined with real names, IP addresses, and often physical address has been exposed in what appears to be one the largest data breach of this year.What's worrisome? There are high chances that you, or at least someone you know, is affected by this latest data breach.Security researcher Chris Vickery of MacKeeper and Steve Ragan of CSOOnline discovered an unsecured and publicly exposed repository of network-available backup files linked to a notorious …
Rate this blog entry:
Continue reading
157 Hits
0 Comments

Hacker Selling Over 1 Million Decrypted Gmail and Yahoo Passwords On Dark Web

Hacker Selling Over 1 Million Decrypted Gmail and Yahoo Passwords On Dark Web
Hardly a day goes without headlines about any significant data breach. In past year, billions of accounts from popular sites and services, including LinkedIn, Tumblr, MySpace, Last.FM, Yahoo!, VK.com were exposed on the Internet.Now, according to the recent news, login credentials and other personal data linked to more than one Million Yahoo and Gmail accounts are reportedly being offered for sale on the dark web marketplace.The online accounts listed for sale on the Dark Web allegedly contai…
Rate this blog entry:
Continue reading
115 Hits
0 Comments

New Fileless Malware Uses DNS Queries To Receive PowerShell Commands

New Fileless Malware Uses DNS Queries To Receive PowerShell Commands
It is no secret that cybercriminals are becoming dramatically more adept, innovative, and stealthy with each passing day.While new forms of cybercrime are on the rise, traditional activities seem to be shifting towards more clandestine techniques that involve the exploitation of standard system tools and protocols, which are not always monitored.The latest example of such attack is DNSMessenger – a new Remote Access Trojan (RAT) that uses DNS queries to conduct malicious PowerShell commands o…
Rate this blog entry:
Continue reading
132 Hits
0 Comments

Google Increases Bug Bounty Payouts by 50% and Microsoft Just Doubles It!

Google Increases Bug Bounty Payouts by 50% and Microsoft Just Doubles It!
Well, there's some good news for hackers and bug bounty hunters!Both tech giants Google and Microsoft have raised the value of the payouts they offer security researchers, white hat hackers and bug hunters who find high severity flaws in their products.While Microsoft has just doubled its top reward from $15,000 to $30,000, Google has raised its high reward from $20,000 to $31,337, which is a 50 percent rise plus a bonus $1,337 or 'leet' award.In past few years, every major company, from Appl…
Rate this blog entry:
Continue reading
181 Hits
0 Comments

How A Simple Command Typo Took Down Amazon S3 and Big Chunk of the Internet

How A Simple Command Typo Took Down Amazon S3 and Big Chunk of the Internet
The major internet outage across the United States earlier this week was not due to any virus or malware or state-sponsored cyber attack, rather it was the result of a simple TYPO.Amazon on Thursday admitted that an incorrectly typed command during a routine debugging of the company's billing system caused the 5-hour-long outage of some Amazon Web Services (AWS) servers on Tuesday.The issue caused tens of thousands of websites and services to become completely unavailable, while others show b…
Rate this blog entry:
Continue reading
149 Hits
0 Comments

Computer operating system and short movie stored on DNA

Computer operating system and short movie stored on DNA
Humanity may soon generate more data than hard drives or magnetic tape can handle, a problem that has scientists turning to nature's age-old solution for information-storage -- DNA. In a new study in Science, a pair of researchers at Columbia University and the New York Genome Center (NYGC) show that an algorithm designed for streaming video on a cellphone can unlock DNA's nearly full storage potential by squeezing more information into its four base nucleotides. They demonstrate that this techn…
Rate this blog entry:
Continue reading
142 Hits
0 Comments

Once overlooked, uninitialized-use 'bugs' may provide portal for hacker attacks on linux

Once overlooked, uninitialized-use
Popular with programmers the world over for its stability, flexibility and security, Linux now appears to be vulnerable to hackers. According to new Georgia Institute of Technology research, uninitialized variables - largely overlooked bugs mostly regarded as insignificant memory errors -- are actually a critical attack vector that can be reliably exploited by hackers to launch privilege escalation attacks in the Linux kernel. When successful, these intrusions give attackers increasing levels of…
Rate this blog entry:
Continue reading
569 Hits
0 Comments

Mathematician breaks down how to defend against quantum computing attacks

Future quantum computers may have the processing power and algorithms to crack them. Nathan Hamlin, instructor and director of the WSU Math Learning Center, is helping to prepare for this eventuality. He is the author of a new paper in the Open Journal of Discrete Mathematics that explains how a code he wrote for a doctoral thesis, the Generalized Knapsack Code, could thwart hackers armed with next generation quantum computers. The paper clarifies misunderstandings about the complex field of pu…
Rate this blog entry:
Continue reading
182 Hits
0 Comments