Monthly Archives: June 2012

Banking Trojan Harvests Newspaper Readers’ Credentials

Beware financial malware that’s trying to harvest usernames and passwords from a major newspaper’s website.

That unusual warning comes by way of security firm ESET, which said it’s observed financial malware known variously as Gataka and Tatanga being used in four recent attack campaigns.

via Banking Trojan Harvests Newspaper Readers’ Credentials – Security – Vulnerabilities and threats – Informationweek.

Feds Bust Hacker For Selling Government Supercomputer Access – Security – Attacks/breaches – Informationweek

In April 16, 2011, meanwhile, the indictment said that Miller chatted with the undercover agent and said hed accessed two nersc.gov supercomputers owned by the National Energy Research Scientific Computer Center NERSC, which provides computer resources for the U.S. Department of Energy. In July 2011, authorities said that for $50,000, he offered to sell the undercover agent “login credentials to a series of computer networks that would enable remote access to the domain nersc.gov.”

via Feds Bust Hacker For Selling Government Supercomputer Access – Security – Attacks/breaches – Informationweek.

LinkedIn Defends Security Practices, Leadership – Security – Attacks/breaches – Informationweek

many businesses see security as “an expensive add-on” and end up not paying sufficient attention to it. “So they’ll dual-hat their IT director and say he’s also doing IT security. And in some organizations–I call it the pile-on–they also pile the chief privacy officer (CPO) responsibilities onto the CIO or CISO role

via LinkedIn Defends Security Practices, Leadership – Security – Attacks/breaches – Informationweek.

Say hello to Tinba: World’s smallest trojan-banker

Tinba is a small data stealing trojan-banker. It hooks into browsers and steals login data and sniffs on network traffic. As several sophisticated banker-trojan it also uses Man in The Browser (MiTB) tricks and webinjects in order to change the look and feel of certain webpages with the purpose of circumventing Two factor Authentification (2FA) or tricking the infected user to give away additional sensitive data such as credit card data or TANs

via CSIS: Say hello to Tinba: World’s smallest trojan-banker.