Blog Posts Tagged with "Domain"

D8853ae281be8cfdfa18ab73608e8c3f

Let Me out Of Your .NET Work: Server Build

September 19, 2012 Added by:Rob Fuller

First you have to get rid of all other services. That’s harder than you would first assume, because you have to admin the box some how. You could toss SSH on a really high port, or have some kind of backend management, or just remove things from running on a multi-IP’d box...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Congress Demands Answers for DHS Domain Name Seizures

September 10, 2012 Added by:Electronic Frontier Foundation

After a year control over dajaz1.com was handed back to the owners with no apology and no explanation. It is disturbing enough that DHS has been acting as the tax-funded hired gun of the content industry, but, even more horrifying it censored the wrong targets for no good reason...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Three Domains Seized for Distributing Pirated Android Apps

August 27, 2012 Added by:Headlines

“Software apps have become an increasingly essential part of our nation’s economy and creative culture, and the Criminal Division is committed to working with our law enforcement partners to protect the creators of these apps and other forms of intellectual property from those who seek to steal it..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Domains Selling Stolen Credit Card Numbers Seized

April 30, 2012 Added by:Headlines

“By seizing the websites the criminal underground uses to blatantly sell stolen personal information, Operation Wreaking hAVoC shows that we are committed to protecting individuals online and preventing criminals from using the Internet to line their pockets..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

A Scanning Tool or a Tool Scanning?

March 26, 2012 Added by:Infosec Island Admin

What is worrying is that the scanner online at amihackerproof.com has no restrictions on it as to who it may scan, just put in an IP or domain name and click to hit some systems using this site. That’s right Mark Zuckerberg, you now can see if facebook.com is easily pwn-able...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FCC Prompts ISPs to Adopt Code of Conduct Standards

February 24, 2012 Added by:Headlines

"If we fail to tackle these challenges, we will pay the price in the form of diminished safety, lost privacy, lost jobs, and financial vulnerability – billions of dollars potentially lost to digital criminals," FCC Chairman Julius Genachowski said...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Beware the TypoSquatters

January 24, 2012 Added by:Theresa Payton

Cybercriminals go where the action is - they wait for websites to get popular and then register domain names based on popular mis-spellings. Once the typosquatter lures you to their site, they use all types of tricks to get you to give them your personal information...

Comments  (0)

Ebdbfa1c3de4d826bbe7fe360c211ecc

Dynamic AJAX CSRF Attack Vector Vulnerability

January 09, 2012 Added by:Shay Chen

Many CSRF prevention mechanisms protect the user by requiring session-specific tokens or custom headers as additional input for action performing modules, and since "normal" CSRF can't analyze responses, these mechanisms prevent most of these attacks - until now...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Feds Seize 150 Websites in Massive Holiday Sting

November 29, 2011 Added by:Headlines

"We are aggressively targeting those who are selling counterfeit goods for their own personal gain while costing our economy much-needed revenue and jobs. Intellectual property crimes harm businesses and consumers, alike, threatening economic opportunity and financial stability..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

EFF Questions Government's Domain Seizure Policies

September 28, 2011 Added by:Headlines

It appears ICE targeted the sites because they contained links to live sport video streams, but the domain seizures impeded access to all of the content on the websites, including obviously non-infringing content like user-created forums, discussions, and technical tutorials...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Populating Your Virtual Victim Domain

September 26, 2011 Added by:Rob Fuller

Adding users to a domain for learning, training, or for testing things out on can be tedious. Most of the time I just put a few users , however that doesn't give someone in training much, i.e.: It's really easy to identify the 'interesting' users when there are only a couple to pick from...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Government Domain Seizures Violate First Amendment

June 22, 2011 Added by:Headlines

"Valid claims of copyright infringement can be pursued in a manner that allows the accused parties to defend themselves. The unilateral seizure of domain names without a court ruling... is improper and should be strongly opposed by free speech advocates everywhere..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Mozilla Defies DHS Internet Censorship Request

May 09, 2011 Added by:Headlines

Mozilla, the non-profit company behind the Firefox Web browser, has initially refused a Department of Homeland Security request to remove a third-party tool that allows users to circumvent government URL blocking efforts...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Bandwidth Usage Statistics for Q4 2010

January 26, 2011 Added by:Simon Heron

A lot of business time and bandwidth is being taken up. With data leaks being such a concern, it is probably time companies create policies to address usage and find ways of enforcing them, as these figures suggest this is not being done at the moment...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacked .GOV .MIL and .EDU Sites for Sale

January 22, 2011 Added by:Headlines

"The victims' vulnerabilities were probably obtained by SQL injection vulnerability automatic scanner and exploited in automatic manner, as the hacker published his methods in a post in some hacker forum – see screen shot and explanation..."

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Delicious WebApp Hacking

January 12, 2011 Added by:Rob Fuller

In the last post I showed off how Archive.org's Wayback machine can be used to pull urls for a domain, another place where URLs are stored and can be searched by domain is Delicious.com. It may even reveal subdomains and hosts you didn't know about. This can be a very handy set of data...

Comments  (1)

Page « < 1 - 2 > »