Once again Microsoft got defaced by means of SQL Injection. Few days ago a defacer known as Agd_Scorp defaced 6 Microsoft websites.
Few years ago, Microsoft was the target of the attacks mostly because defacers liked Linux more. Now it is just “for fame”. Also in this case defacer didn’t leave any message.
The defacer also attacked many high profile companies and other interesting targets (for example, https://dol.hqda.pentagon.mil) by means of SQL Injection as to demonstrate that sometimes people are not checking the source code well enough…
If you still didn’t have vacations, maybe it is worth to wait until the end of the October and visit the Hack In The Box conference in Malaysia. Let’s take a look on some of the speakers and their topics.
The official Malaysian Kaspersky Antivirus’s website has been hacked yesterday by a Turkish cracker going by the handle of “m0sted”.
Along with it, the same cracker hacked also the official Kaspersky S.E.S. online shop and its several other subdomains.
The attacker reported “patriotism” as the reason behind the attack and “SQL Injection” as the technical way the intrusion was performed.
Both websites has been home page defaced as well as several other secondary pages. The incident, though appearing a simple website defacement, might carry along big risks for end-users because from both the websites, evaluation copies of the Kaspersky Antivirus are distributed to the public. In theory, the attacker could have uploaded trojanized versions of the antivirus, infecting in this way the unaware users attempting a download from a trusted Kaspersky’s file repository (remember the trojan in the Debian file repository?).
For all you folks, fan of the civil liberties as well as the Olympic games, here’s the integral text of the International Olympic Committee Blogging Guidelines for the accredited persons. It’s the perfect companion of the recent decision from the Olympic Chinese Committee to ban the flags from the stadiums.
As you will read, blogs are admitted but:– should not contain information not related to strictly personal experience – should not contain sound or moving images from the Olympic Games – should not contain still images containing any sporting action of the
Games or the Opening, Closing or Medal Ceremonies of the Games. – should not contain the Olympic symbol – should not contain commercial references (Blogspot, bye bye!) – should not contain the word “Olympic” within the blog URL
But you are lucky, still you can use your plain white Olympic blog homepage to test the brightness of your screen.
… enjoy and please comment the official text
“It is not a bug, it is a feature. You invented the wheel.”
If you get this kind of answer from a website operator in relation to a security bug found in his application, then you have only two choices: either you’re paranoid or the operator doesn’t care much about security. What are talking about? About leakage of 250.000 email addresses.
One of the most visited websites in Slovakia, the community website Azet.sk known thanks to his freemail and chat services has several sections, among which is also a dating section . The website is visited by surfers of various age that would like to find a partner for anything: chating, meeting, sex etc. You just put an announce and everybody can respond you through a web form. But few days ago, on one of the most visited security blogs in Slovakia blog.synopsi.com appeared the detailed description of how to get email addresses from the Azet dating service with a PoC script.