10-26-2013 CTF 101

capture the flag

On October 26th we will cover the following topic: Computer security Capture The Flag games: – What are they? – Is it only for UBER technical people? – NO – What gear do I need to play in one? – How can I make a team and play? – Where do I get information about […]

10-12-2013 Introduction to Scapy and Capture The Packet

Tcpdump

Introduction to Scapy and Capture The Packet           On November 12th we will have a presentation by @acex0r giving an introduction to the manipulation packet tool named SCAPY. Following the presentation we will have a small Capture The Packet game so attendants can apply some of the concepts and techniques given […]

Hacking U.S. Secrets, China Pushes for Drones

110_drones

For almost two years, hackers based in Shanghai went after one foreign defense contractor after another, at least 20 in all. Their target, according to an American cybersecurity company that monitored the attacks, was the technology behind the United States’ clear lead in military drones. “I believe this is the largest campaign we’ve seen that […]

Barclays hacking attack: four charged over £1.3 million theft

110_barclays

Four men have been charged in connection with the theft of £1.3m from a Barclays bank branch by taking control of its computer system. The money was transferred by a computer at a branch in Swiss Cottage, north London, in April after an alleged hacking attack. It is believed somebody posing as an engineer at […]

Belgacom Attack: Britain’s GCHQ Hacked Belgian Telecoms Firm

110_belgacom

A cyber attack on Belgacom raised considerable attention last week. Documents leaked by Edward Snowden and seen by SPIEGEL indicate that Britain’s GCHQ intelligence agency was responsible for the attack. Documents from the archive of whistleblower Edward Snowden indicate that Britain’s GCHQ intelligence service was behind a cyber attack against Belgacom, a partly state-owned Belgian […]

Hidden Lynx – Professional Hackers for Hire

110_lynx

For the past few years, reports have continued to emerge detailing the activities of actors behind various targeted attacks or Advanced Persistent Threats (APTs). Here at Symantec Security Response, we’ve been keeping our eyes on a group that we believe are among the best of breed. We’ve given them the name of Hidden Lynx—after a […]