According to the Ethical Hacking group YGN, Apple’s website for developers is virtually wide open and gives the opportunity for hackers to introduce malware such asphishing attacks to gain access to subscriber’s vital personal information.
One group known as Networkworld identified three holes on Apple’s website that arbitrary URL redirects, cross-site scripting and HTTP response splitting. That said, these holes could allow hackers to arbitrarily redirect to other websites and make phishing attacks against developers login credentials more successful.
Read More…..
Tags: Adobe, anti-exploit defense, apple, application security, attack code, authors, beta programs, blog posts, browser vendor, browsers, Bugs, Computers, desktop, developers, Ethical Hacking, exploit vulnerabilities, hacker forums, Hackers, internet, Internet Explorer, iOS, MAC, Mac OS X, malicious code, malware, Microsoft, Mozilla, Networkworld, Online, online attacks, operating systems, OS, PC's, phishing, prize pot, programming, programs, Pwn2Own, Reader program, remote access, remote access trojan, researchers, Safari, sandbox, security teams, security threats, Software, software developers, source code, successful attack, system processes, Trojan horse, tweaked coade, vendors, video demo, Virus, web, Windows, wreak havoc on computer, writers, writing viruses, YGNEthical Hacking Group
As Apple’s popularity continues to increase, so too does the malicious interest of hackers in their famed products. Researchers at Sophos say they’ve uncovered a new Trojan horse program written for the Mac.
It’s called the BlackHole RAT (the RAT part is for “remote access Trojan”) and it’s pretty easy to find online in hacking forums, according to Chet Wisniewski a researcher with antivirus vendor Sophos. There’s even a YouTube video demo of the program that details what its capable of doing.
Sophos hasn’t seen the Trojan used in any online attacks -it’s more a bare-bones, proof-of-concept beta program right now – but the software is pretty easy to use, and if a criminal could find a way to get a Mac user to install it, or write attack code that would silently install it on the Mac, it would give him remote control of the hacked machine. Read More….
Tags: 60606, advantages of using a consultant, anti-virus, antivirus software, apple, attack code, authors, best Internet Phone Service, beta programs, BlackHole, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, Computer Consultants, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, criminals, darkComet, data centers, desktop, developers, email services, Google, hacker forums, Hackers, Help Desk Services, installation, internet, IT Audits, IT Outsourcing, linksys routers, Network routers, Online, online attacks, operating systems, OS, PC repairs, PC's, products, programming, programs, proof-of-concept, RAT, remote access, remote access trojan, researchers, Routers, security threats, silently installed, Software, Sophos, source code, Telcom Audits, telephone auditing review, The Syber Group, Trojan horse, tweaked coade, vendors, video demo, Virtual Computers, Virtualization, Virus, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, web, Windows, Windows Technician, Wireless Internet, writers, writing viruses, YouTube