Remove tag advertising
Remove Computer and Electronics Remove Document Remove Examples Remove Security
article thumbnail

Analyzing the APT34’s Jason project

Security Affairs

Security expert Marco Ramilli has analyzed the recently leaked APT34 hacking tool tracked as Jason – Exchange Mail BF. For example it wraps up a file called Year.txt including numbers from 1900 to 2020, a file called numspecial.txt including special numbers patterns and special chars patterns, a file called num4.txt

article thumbnail

TA505 Cybercrime targets system integrator companies

Security Affairs

Attached to the email a suspicious word document was waiting to be opened from the victim. Hash 7ebd1d6fa8c21b0d0c015475ab8c7225f949c13a33d0a39b8c069072a4281392 Threat Macro Dropper Brief Description Document Dropper Ssdeep 384:nFZ5ZtDGGkLmTUrioRPATRn633Dmej0SnJzbmiVywP0jKk:n1oqwT2J633DVgiVy25. Image1: Word Document Content.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apple founder Steve Wozniak interview, answers your Tweeted questions | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Wearing a fascinating looking tube valve watch (which didn’t look like Apple’s industrial design) Steve took to the stage and ran through a rapid history of modern personal computing from a very personal perspective.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

I’m Robert Vamosi and in this episode I’m discussing the weird science of how the physics of light and sound --not keyboards or code -- can be used to compromise electronic devices and the consequences of that in the real world. The classic example would be the buffer overflow. That's one thing but with our laser work.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

I’m Robert Vamosi and in this episode I’m discussing the weird science of how the physics of light and sound --not keyboards or code -- can be used to compromise electronic devices and the consequences of that in the real world. The classic example would be the buffer overflow. That's one thing but with our laser work.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

I’m Robert Vamosi and in this episode I’m discussing the weird science of how the physics of light and sound --not keyboards or code -- can be used to compromise electronic devices and the consequences of that in the real world. The classic example would be the buffer overflow. That's one thing but with our laser work.