Isn't it just everybody's dream: to walk up to an ATM, swipe your card, get a flashy screen reading "We Have A Winner," and watch the machine spew out all its money? That dream just became reality. At least in a great presentation from Barnaby Jack at the Black Hat Briefings in Las Vegas. "Jackpotting ...
Read Blog
Operation Aurora has received a lot of attention over the past couple of days.  To recap, Google, Adobe, and many other companies were attacked with code exploiting a zero-day vulnerability in Internet Explorer.  Since the announcement of this vulnerability (CVE-2010-0249), exploit code has been made public and already revised into a more usable form. History ...
Read Blog
Earlier today, George Kurtz posted an entry, ‘Operation “Aurora” Hit Google, Others’,  on the McAfee’s Security Insight blog  The purpose of this blog is to answer questions about this particular attack; fill in some of the threat flow and McAfee coverage details. How were systems compromised? When a user manually loaded/navigated to a malicious web ...
Read Blog