Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Black-Hat Delegates Get Suspicious E-mail

The Las Vegas (Nevada, US) held Black-Hat Hacker Conference started with an unusual incident when numerous people attending it on July 22, 2012 got one doubtful electronic mail inside their mailboxes, published threatpost.com dated July 22, 2012.

It maybe noted that the year after year scheduled Black-Hat Conference is an event where the globe's most talented hackers congregate

Displaying a caption "Your admin password," the spurious electronic mail circulated amongst 7,500 participants at the conference.

The short digital message dispatched from an id having the domain name itn-international.com stated that it was certain notification from the current year's (2012) Black-Hat. As the reader had asked for one fresh password, the details were being provided, it stated. Following this, there were an empty username and password along with one URL, which the e-mail recipients were directed for utilizing while signing in.

The infamously security-aware attendees at the Black-Hat quickly reacted. By using social-networking websites, security specialists enquired of what numerous people though was certain social engineering assault or phishing e-mail.

Conference organizers instantly offered apologies following the mishap that according to them was from a volunteer. They posted that the web-link given within the fake e-mail took onto a site supported on their system-network for registration. After examining their server logs, the organizers detected the user, the website followed with talking to the volunteer. Since the Black-Hat's most valued possessions were its delegates, the organizers worked diligently towards maintaining the formers privacy. They desired that everybody should come to the conference and learn and have fun while not worry about getting their specialized alternatively private data compromised. During the current conference, there hadn't been any compromise, the organizers announced. ZDNet.com published this on July 23, 2012.

Meanwhile, Security Researcher Paul Ducklin from Sophos the security company indicated that probably the phishers expected the recipients to get deceived with the blank user id and password and so sign into the fake URL using their actual log-in credentials for examining what was happening. But luckily, the phishing attempt wasn't ever going to tick due to the cracked web-link, the researcher added. Tgdaily.com published this on July 23, 2012.

Related article: Blogs With malware Make Them Risky

ยป SPAMfighter News - 7/31/2012

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page