Remove 2015 Remove Computer and Electronics Remove Examples Remove Security
article thumbnail

Six Charged in Mass Takedown of DDoS-for-Hire Sites

Krebs on Security

men with computer crimes related to their alleged ownership of the popular DDoS-for-hire services. Miller was charged this week with conspiracy and violations of the Computer Fraud and Abuse Act (CFAA). The DOJ also charged six U.S. The booter service OrphicSecurityTeam[.]com com and royalstresser[.]com Defendant Angel Manuel Colon Jr.

article thumbnail

Canada Uses Civil Anti-Spam Law in Bid to Fine Malware Purveyors

Krebs on Security

Federal Communications Commission (FCC), executed a search warrant in tandem with the Royal Canadian Mounted Police (RCMP) at the home of a Toronto software developer behind the Orcus RAT , a product that’s been marketed on underground forums and used in countless malware attacks since its creation in 2015. ”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NASA warns of a significant increase in cyber attacks during Coronavirus outbreak

Security Affairs

During the past few weeks, NASA’s Security Operations Center (SOC) mitigation tools have prevented success of these attempts.” NASA employees and contractors should be aware that nation-states and cyber criminals are actively using the COVID-19 pandemic to exploit and target NASA electronic devices, networks, and personal devices.”

article thumbnail

Analyzing the APT34’s Jason project

Security Affairs

Security expert Marco Ramilli has analyzed the recently leaked APT34 hacking tool tracked as Jason – Exchange Mail BF. For example it wraps up a file called Year.txt including numbers from 1900 to 2020, a file called numspecial.txt including special numbers patterns and special chars patterns, a file called num4.txt

article thumbnail

US Army stopped using floppy disks as storage for SACCS system that manages nuclear weapons arsenal

Security Affairs

The news is quite curious, the US military will no longer use 8-inch floppy disks in an antiquated computer (SACCS) to manage nuclear weapons arsenal. In June, the US Air Force has replaced the floppy disks in the SACCS nuclear weapons management system with a “highly-secure solid state digital storage solution.”

article thumbnail

From Targeted Attack to Untargeted Attack

Security Affairs

For example a targeted attack might address Naval industry ( MartyMcFly example is definitely a great example) or USA companies ( Botnet Against USA, Canada and Italy is another great example) and are mainly built focusing specific target sectors. I am a computer security scientist with an intensive hacking background.

article thumbnail

Scraping the TOR for rare contents

Security Affairs

Cyber security expert Marco Ramilli explains the difficulties for scraping the ‘TOR networks’ and how to enumerate hidden-services with s crapers. For example bots pushing “interesting links” back online even after months of inactivity. I am a computer security scientist with an intensive hacking background.