HostSailor Threatens to Sue KrebsOnSecurity

Earlier this month, KrebsOnSecurity published The Reincarnation of a Bulletproof Hoster, which examined evidence suggesting that a Web hosting company called HostSailor was created out of the ashes of another, now-defunct hosting firm notorious for harboring spammers, scammers and other online ne’er-do-wells. Today, HostSailor’s lawyers threatened to sue this author unless the…

A Life or Death Case of Identity Theft?

Identity thieves have perfected a scam in which they impersonate existing customers at retail mobile phone stores, pay a small cash deposit on pricey new phones, and then charge the rest to the victim’s account. In most cases, switching on the new phones causes the victim account owner’s phone(s) to go…

The Internet of Broken Protocols: Showcase #5

(complete list of protocols: https://vnhacker.blogspot.com/search/label/The%20Internet%20of%20Broken%20Protocols)Administrative note: I've posted solutions to the first 4 challenges. Some readers again found attacks that I wasn't aware of, but I'm not surprised anymore :=).I'm interested in making my puppy protocols less broken, so please share with me your "patches". I'm also open to challenge…

The Internet of Broken Protocols: Showcase #5

(complete list of protocols: https://vnhacker.blogspot.com/search/label/The%20Internet%20of%20Broken%20Protocols)Administrative note: I've posted solutions to the first 4 challenges. Some readers again found attacks that I wasn't aware of, but I'm not surprised anymore :=).I'm interested in making my puppy protocols less broken, so please share with me your "patches". I'm also open to challenge…

GSoC WebUI overview

by https://twitter.com/GautierGC April 22th, my GSoC proposal for the radare web UI [was accepted] https://summerofcode.withgoogle.com/organizations/4965722304282624/#5484657504157696. Until today, I’ve made the UI progressed. The purpose of this article isn’t to close this chapter but to relate what I’ve done and share my experience about this Google Summer of Code. I would…

Massive Email Bombs Target .Gov Addresses

Over the weekend, unknown assailants launched a massive cyber attack aimed at flooding targeted dot-gov (.gov) email inboxes with subscription requests to thousands of email lists. According to experts, the attack — designed to render the targeted inboxes useless for a period of time — was successful largely thanks to…
1 2 3