Datenterrorist
"There is no spoon." - Matrix _

.:: Wir lieben Überwachung ::.

22.08.14 15:35:00 - balle - No comments - Emacs


.:: Snakes on a Hadoop ::.

18.07.14 16:07:31 - balle - No comments - Python


.:: Malware on European SCADA systems ::.

"Security researchers have uncovered a new Stuxnet like malware, named
as “Havex”, which was used in a number of previous cyber attacks
against organizations in the energy sector. Just like Famous Stuxnet
Worm, which was specially designed to sabotage the Iranian nuclear
project, the new trojan Havex is also programmed to infect industrial
control system softwares of SCADA and ICS systems"

Source: The Hacker News
27.06.14 13:41:48 - balle - No comments - News


.:: Why it's dumb to use a smartphone ::.

"Researchers from the Citizen Lab at the Munk School of Global Affairs at the University of Toronto and computer security firm Kaspersky Lab have unearthed a broad network of controversial spyware which is specially designed to give law enforcement agencies complete access to a suspect's phone for the purpose of surveillance.
[...]
According to the report published, the diameter of the command infrastructure supporting Hacking Team, which sells the RCS to governments and law enforcement, is very vast with 326 command-and-control (C&C) servers running in more than 40 countries."

Source: The Hacker News
25.06.14 16:21:56 - balle - No comments - Stasi 2.0


.:: BDFProxy ::.

"Das Pentesting-Tool BDFProxy arbeitet zumeist wie ein normaler Webproxy und leitet den Datenverkehr einfach durch. Fordert der Client des Nutzers jedoch eine Binärdatei an, zeigt es sich von einer anderen Seite: Es fängt den Transfer und lädt die Datei zunächst komplett herunter. Anschließend versucht es, eine Metasploit-Payload in die Datei zu injizieren und gibt das Ergebnis schließlich an den Client weiter. "
Quelle: Heise
https://github.com/secretsquirrel/BDFProxy
06.06.14 09:38:13 - balle - No comments - Software


.:: Von ferngesteuerten Autos ::.

04.06.14 10:24:19 - balle - No comments - Hacking