Weekly Link Dump 6

AutoIt Used to Spread Malware and Toolsets – http://blog.trendmicro.com/trendlabs-security-intelligence/autoit-used-to-spread-malware-and-toolsets/

 China is using espionage to acquire technologies to fuel its fast-paced military modernization program – http://uk.reuters.com/article/2013/05/07/uk-usa-defense-china-idUKBRE9450TV20130507

 Open-source ruby project to handle the storage and linking of open-source intelligence – https://github.com/mgeide/poortego

 A simple method for improving the security of hashed passwords: the maintenance of additional \honeywords (false passwords) associated with each user’s account – http://people.csail.mit.edu/rivest/pubs/JR13.pdf

 Researchers Hack Building Control System at Google Australia Office – http://www.wired.com/threatlevel/2013/05/googles-control-system-hacked/

 Internet Explorer zero-day exploit targets nuclear weapons researchers – http://arstechnica.com/security/2013/05/internet-explorer-zero-day-exploit-targets-nuclear-weapons-researchers/

 Identifying and Exploiting Windows Kernel Race Conditions via Memory Access Patterns – http://j00ru.vexillium.org/?p=1695

 A primer on Bitcoin risks and threats – https://www.net-security.org/secworld.php?id=14857

 Globally networked risks are difficult to identify, map and understand, since there are often no evident, unique cause-effect relationships – http://www.sciencedaily.com/releases/2013/05/130501131943.htm

 DNS cache poisoning, also known as DNS spoofing, is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones – http://www.howtogeek.com/161808/htg-explains-what-is-dns-cache-poisoning/

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top