ma Anomalous-Payload-based-Worm-Detection-and-Signature-Generation.pdf By packetstormsecurity.com Published On :: Wed, 01 Nov 2006 16:23:02 GMT Anomalous Payloadbased Worm Detection and Signature Generation. Full Article
ma Using ShoutBoxes To Control Malicious Software By packetstormsecurity.com Published On :: Tue, 14 Apr 2009 23:17:50 GMT Whitepaper called Using "ShoutBoxes" to control malicious software. Full Article
ma How Conficker Makes Use Of MS08-067 By packetstormsecurity.com Published On :: Wed, 15 Apr 2009 00:06:50 GMT Whitepaper called How Conficker makes use of MS08-067. Full Article
ma LPRng use_syslog Remote Format String Vulnerability By packetstormsecurity.com Published On :: Wed, 17 Feb 2010 23:45:41 GMT This Metasploit module exploits a format string vulnerability in the LPRng print server. This vulnerability was discovered by Chris Evans. There was a publicly circulating worm targeting this vulnerability, which prompted RedHat to pull their 7.0 release. They consequently re-released it as "7.0-respin". Full Article
ma PHP-Nuke 7.0 / 8.1 / 8.1.35 Wormable Remote Code Execution By packetstormsecurity.com Published On :: Wed, 05 May 2010 00:53:06 GMT PHP-Nuke versions 7.0, 8.1 and 8.1.35 wormable remote code execution exploit. Full Article
ma Linksys E-Series TheMoon Remote Command Injection By packetstormsecurity.com Published On :: Sat, 05 Apr 2014 03:11:21 GMT Some Linksys E-Series Routers are vulnerable to an unauthenticated OS command injection. This vulnerability was used from the so called "TheMoon" worm. There are many Linksys systems that might be vulnerable including E4200, E3200, E3000, E2500, E2100L, E2000, E1550, E1500, E1200, E1000, E900. This Metasploit module was tested successfully against an E1500 v1.0.5. Full Article
ma Metamorphic Worms: Can They Remain Hidden? By packetstormsecurity.com Published On :: Mon, 02 Feb 2015 10:22:22 GMT Whitepaper that discusses types of computer worms and how metamorphic worms differ from the rest. Full Article
ma Hak5 WiFi Pineapple Preconfiguration Command Injection 2 By packetstormsecurity.com Published On :: Wed, 19 Oct 2016 01:02:21 GMT This Metasploit module exploits a command injection vulnerability on WiFi Pineapples versions 2.0 and below and pineapple versions prior to 2.4. We use a combination of default credentials with a weakness in the anti-csrf generation to achieve command injection on fresh pineapple devices prior to configuration. Additionally if default credentials fail, you can enable a brute force solver for the proof-of-ownership challenge. This will reset the password to a known password if successful and may interrupt the user experience. These devices may typically be identified by their SSID beacons of 'Pineapple5_....'; details derived from the TospoVirus, a WiFi Pineapple infecting worm. Full Article
ma Morris Worm sendmail Debug Mode Shell Escape By packetstormsecurity.com Published On :: Mon, 05 Nov 2018 21:09:02 GMT This Metasploit module exploits sendmail's well-known historical debug mode to escape to a shell and execute commands in the SMTP RCPT TO command. This vulnerability was exploited by the Morris worm in 1988-11-02. Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg. Currently only cmd/unix/reverse and cmd/unix/generic are supported. Full Article
ma Opera Sings Anti-Malware Tune By packetstormsecurity.com Published On :: Fri, 06 Jun 2008 02:27:59 GMT Full Article malware opera
ma Opera Says Bug Probably Can't Commandeer Machines By packetstormsecurity.com Published On :: Fri, 05 Mar 2010 22:35:14 GMT Full Article opera
ma Osama bin Laden, The Face Of Terror, Killed In Pakistan By packetstormsecurity.com Published On :: Mon, 02 May 2011 03:28:24 GMT Full Article headline pakistan terror
ma CIA's Most Senior Official In Pakistan 'Unmasked' By Khan's Party By packetstormsecurity.com Published On :: Wed, 27 Nov 2013 16:06:38 GMT Full Article headline government usa cyberwar pakistan cia
ma Pakistan Military Hit By Operation Shaheen Malware By packetstormsecurity.com Published On :: Tue, 13 Nov 2018 16:43:38 GMT Full Article headline government malware cyberwar pakistan
ma Researcher Raids Browser History For Webmail Login Tokens By packetstormsecurity.com Published On :: Mon, 20 Jul 2009 18:12:43 GMT Full Article csrf
ma Kim Dotcom Sues New Zealand Government For Damages By packetstormsecurity.com Published On :: Mon, 22 Jan 2018 15:03:58 GMT Full Article headline government fraud mpaa new zealand
ma Feds Bust Man Selling $1.2m In Counterfeit Microsoft Software By packetstormsecurity.com Published On :: Sat, 10 Nov 2012 02:52:47 GMT Full Article headline microsoft cybercrime fraud ebay
ma Amazon, eBay, Banks Snub Anti-DNS Fraud Tech By packetstormsecurity.com Published On :: Mon, 18 Feb 2013 15:19:51 GMT Full Article headline bank amazon dns fraud ebay
ma eBay Makes Users Change Their Passwords After Hack By packetstormsecurity.com Published On :: Wed, 21 May 2014 15:11:50 GMT Full Article headline hacker data loss password ebay
ma eBay Faces Investigations Over Massive Data Breach By packetstormsecurity.com Published On :: Fri, 23 May 2014 13:11:24 GMT Full Article headline hacker database data loss password ebay
ma Massive Vulnerability Discovered In eBay's Magento By packetstormsecurity.com Published On :: Wed, 29 Apr 2015 02:57:43 GMT Full Article headline cybercrime fraud flaw ebay
ma Blackhats Using Mystery Magento Card Stealers By packetstormsecurity.com Published On :: Mon, 29 Jun 2015 14:01:12 GMT Full Article headline bank cybercrime fraud flaw ebay
ma Data Easily Recovered From eBayed Smartphones, Disks By packetstormsecurity.com Published On :: Thu, 08 Oct 2015 00:35:15 GMT Full Article headline privacy phone data loss google ebay apple
ma eBay Refuses To Fix Flaw Exposing Users To Malware And Phishing Attacks By packetstormsecurity.com Published On :: Tue, 02 Feb 2016 16:48:11 GMT Full Article headline malware flaw ebay phish
ma Amazon And eBay Pull Hackable CloudPets By packetstormsecurity.com Published On :: Wed, 06 Jun 2018 16:01:22 GMT Full Article headline hacker privacy amazon spyware ebay
ma Many Sites Reusing Heartbleed Compromised Private Keys By packetstormsecurity.com Published On :: Fri, 09 May 2014 23:22:10 GMT Full Article headline privacy data loss flaw ssl cryptography
ma OpenSSL Man In The Middle Flaw Found After 16 Years By packetstormsecurity.com Published On :: Fri, 06 Jun 2014 12:47:38 GMT Full Article headline privacy flaw ssl cryptography
ma Novell ZENworks Configuration Management Remote Execution By packetstormsecurity.com Published On :: Tue, 02 Apr 2013 15:07:51 GMT This Metasploit module exploits a code execution flaw in Novell ZENworks Configuration Management 10 SP3 and 11 SP2. The vulnerability exists in the ZEnworks Control Center application, allowing an unauthenticated attacker to upload a malicious file outside of the TEMP directory and then make a second request that allows for arbitrary code execution. This Metasploit module has been tested successfully on Novell ZENworks Configuration Management 10 SP3 and 11 SP2 on Windows 2003 SP2 and SUSE Linux Enterprise Server 10 SP3. Full Article
ma Mandriva Linux Security Advisory 2015-046 By packetstormsecurity.com Published On :: Thu, 12 Feb 2015 16:45:56 GMT Mandriva Linux Security Advisory 2015-046 - Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. Full Article
ma Mandriva Linux Security Advisory 2015-140 By packetstormsecurity.com Published On :: Mon, 30 Mar 2015 21:48:37 GMT Mandriva Linux Security Advisory 2015-140 - If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated. ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys. A remote unauthenticated attacker may craft special packets that trigger buffer overflows in the ntpd functions crypto_recv() (when using autokey authentication), ctl_putdata(), and configure(). The resulting buffer overflows may be exploited to allow arbitrary malicious code to be executed with the privilege of the ntpd process. A section of code in ntpd handling a rare error is missing a return statement, therefore processing did not stop when the error was encountered. This situation may be exploitable by an attacker. Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. The ntp package has been patched to fix these issues. Full Article
ma Diebold Uses DMCA to Conceal E-Voting Machine Flaws By packetstormsecurity.com Published On :: Wed, 29 Oct 2003 22:45:15 GMT Full Article government flaw dmca
ma Demonoid Still Down One Week After Massive DDoS Attack By packetstormsecurity.com Published On :: Wed, 01 Aug 2012 15:01:18 GMT Full Article headline denial of service riaa dmca mpaa pirate
ma Rebel Hackers Seize Libyan Domain Name Registry By packetstormsecurity.com Published On :: Mon, 22 Aug 2011 14:05:57 GMT Full Article headline hacker libya
ma Pentagon Cyberwarriors Hit Iraq with Unsolicited Bulk Email By packetstormsecurity.com Published On :: Mon, 03 Mar 2003 05:00:55 GMT Full Article government email cyberwar iraq
ma US Marine Unearths Nukes, Cocaine, And $25 Million By packetstormsecurity.com Published On :: Mon, 04 Sep 2006 22:16:23 GMT Full Article usa iraq
ma Iraq Collapse May Pose New WMD Threat, Say UN Monitors By packetstormsecurity.com Published On :: Thu, 21 Jun 2007 09:47:19 GMT Full Article privacy iraq
ma Anonymous Releases Law Firm's Emails About Haditha Killings By packetstormsecurity.com Published On :: Tue, 07 Feb 2012 01:26:16 GMT Full Article headline data loss iraq anonymous
ma Hackers Disrupt 51 Malaysian Government Websites By packetstormsecurity.com Published On :: Thu, 16 Jun 2011 10:52:16 GMT Full Article headline hacker government malaysia
ma Cert Stolen From Malaysian Government Used To Sign Malware By packetstormsecurity.com Published On :: Tue, 15 Nov 2011 06:02:04 GMT Full Article headline government malware ssl malaysia
ma Malaysian Election Sparks Denial Of Service By packetstormsecurity.com Published On :: Thu, 09 May 2013 15:07:38 GMT Full Article headline government denial of service malaysia
ma Google Malaysia Site DNS Hacked By packetstormsecurity.com Published On :: Fri, 11 Oct 2013 15:24:13 GMT Full Article headline hacker dns google malaysia
ma Fake Malaysia Airlines Links Spread Malware By packetstormsecurity.com Published On :: Tue, 18 Mar 2014 01:56:35 GMT Full Article headline malware malaysia
ma Malaysia-Based Credit Card Fraud Ring Broken, 105 Arrested By packetstormsecurity.com Published On :: Sat, 09 Jul 2016 02:56:15 GMT Full Article headline bank cybercrime fraud malaysia
ma It Sounds Like Everyone In Malaysia Has Been Pwned By packetstormsecurity.com Published On :: Thu, 02 Nov 2017 15:22:39 GMT Full Article headline hacker government privacy data loss malaysia
ma Obama’s International Climate Strategy: More Grease for Renewables By feedproxy.google.com Published On :: 2014-09-10T13:58:00Z It was good news for renewable energy when President Barack Obama in June proposed carbon dioxide restrictions on existing power plants. It is even better news now that he may use the plan to leverage an international climate accord. Full Article Energy Efficiency Hydropower Baseload Storage Energy Efficiency Bioenergy Policy Wind Power Solar Geothermal
ma Exploring Finance Options: Yield-cos Don’t Fit the Bill for Many Renewable Energy Companies By feedproxy.google.com Published On :: 2014-09-12T18:34:00Z Yield-cos have been grabbing headlines lately. Typically, large utilities spin off their high-yield alternative energy operations into separate smaller companies called yield-cos. These new companies are then taken public to attract individual and institutional investors. Full Article Hydropower Baseload Bioenergy Wind Power Opinion & Commentary Solar Geothermal
ma UN Climate Summit Heats Up Discussion on Global Warming, Carbon Emissions By feedproxy.google.com Published On :: 2014-09-24T11:12:00Z More than 100 world leaders converged upon New York City today to discuss international efforts to reduce carbon emissions and combat climate change. The list of speakers at the UN Climate Summit included U.S. President Barack Obama, UK Prime Minister David Cameron, Brazilian President Dilma Rousseff, French President François Hollande, and Chinese Vice Premier Zhang Gaoli. Full Article Energy Efficiency Hydropower Baseload Storage Energy Efficiency Bioenergy Wind Power Solar Geothermal
ma RGGI Chair Says States Won’t Leave Emissions Trading Market for California, Quebec By feedproxy.google.com Published On :: 2014-09-25T13:46:00Z California and Quebec, which together created the largest carbon market in North America this year, may come away empty-handed as they woo northeastern U.S. states to join their system. Full Article Storage Energy Efficiency Wind Power Solar
ma Ukraine Crisis May Spur EU Clean Energy Policies, Neste Oil Says By feedproxy.google.com Published On :: 2014-09-26T10:07:00Z Europe’s concern about its reliance on Russian fossil fuels may spur governments to prioritize alternative energy, the head of Neste Oil Oyj said. Full Article Storage Energy Efficiency Wind Power Solar
ma German Renewables Output Tops Lignite By feedproxy.google.com Published On :: 2014-10-01T13:32:00Z Renewables became Germany’s most important power source for the first time this year, according to Agora Energiewende. Full Article Energy Efficiency Hydropower Baseload Storage Energy Efficiency Bioenergy Wind Power Solar Geothermal