Monthly Archives: July 2013

New Best Practices for Detecting Malware in the 21st Century

Jul 31, 2013, 11:30 am EST By Stephen Newman, Vice President of Products, Damballa Detecting malicious network behavior isn’t as straightforward as it used to be. Organizations can no longer […]

Posted in Uncategorized | Comments Off on New Best Practices for Detecting Malware in the 21st Century

Researcher demonstrated SmartTV hacking on Samsung models

Jul 30, 2013, 11:00 am EST The researcher Malik Mesellem demonstrated that SmartTV hacking is a real menace, Samsung models could be forced to reboot sending an HTTP GET request It is […]

Posted in Uncategorized | Comments Off on Researcher demonstrated SmartTV hacking on Samsung models

Context Information Security report “Web Application Vulnerability Statistics 2013

Jul 29, 2013, 11:30 am EST Context Information Security  issued the report “Web Application Vulnerability Statistics 2013” that provides statistic on Web Application Vulnerabilities based on data gathered from a […]

Posted in Uncategorized | Comments Off on Context Information Security report “Web Application Vulnerability Statistics 2013

Vulnerability disclosed pwds of all Barracuda Network Employees

Jul 25, 2013, 11:30 am EST The cyber security Analyst @Qcert Ebrahim Hegazy(@Zigoo0) has found a Password disclosure vulnerability in one of Barracuda update servers which allows the attackers to gain access […]

Posted in Uncategorized | Comments Off on Vulnerability disclosed pwds of all Barracuda Network Employees

Who has hacked the Apple iOS Developer Center?

Jul 24, 2013, 11:30 am EST After a weekend of outage and various mysterious password reset emails Apple has revealed that the iOS Developer Center was hacked. After 3 days […]

Posted in Uncategorized | Comments Off on Who has hacked the Apple iOS Developer Center?

Security experts uncovered an unusual cyber espionage ….

Jul 23, 2013, 01:00 pm EST Security experts uncovered an unusual cyber espionage campaign based on file infector belonging to the PE_EXPIRO family that includes information theft module Security experts […]

Posted in Uncategorized | Comments Off on Security experts uncovered an unusual cyber espionage ….

Hackers breach Nasdaq community forum website

Jul 22, 2013, 06:30 pm EST By Matthew Finnegan Trend Micro uncovered targeted attack against European and Asian government agencies to steal login credentials from IE and Microsoft Outlook products. Hackers […]

Posted in Uncategorized | Comments Off on Hackers breach Nasdaq community forum website

Korea sets out to train more cyber experts, hackers

Jul 22, 2013, 11:30 am EST By Jin Eun-soo and Choi Jung-min South Korea is taking belated-yet-necessary-steps to train more cyber security experts following a series of disruptive hacking attacks […]

Posted in Uncategorized | Comments Off on Korea sets out to train more cyber experts, hackers

Trend Micro – targeted attack against Europe-Asia government agencies

Jul 22, 2013, 11:30 am EST Trend Micro uncovered targeted attack against European and Asian government agencies to steal login credentials from IE and Microsoft Outlook products. A new targeted […]

Posted in Uncategorized | Comments Off on Trend Micro – targeted attack against Europe-Asia government agencies

Cyber Intelligence Europe 2013

CYBER INTELLIGENCE EUROPE  17-19 September 2013 Venue : Renaissance Marriott Brussels Hotel, Brussels, Belgium Jul 18, 2013, 04:00 pm EST EARLY BIRD OFFER EXPIRES ON THE 31st JULY 2013 – BOOK TODAY […]

Posted in Uncategorized | Comments Off on Cyber Intelligence Europe 2013

Gaming platforms under attack – Nintendo and Ubisoft hacks

Jul 17, 2013, 11:00 am EST The number of attacks against gaming platforms is constantly increasing, the recent data breach occurred to Nintendo and Ubisoft are just the tip of […]

Posted in Uncategorized | Comments Off on Gaming platforms under attack – Nintendo and Ubisoft hacks

Researchers can hack Verizon Wireless femtocells to spy on customers

Jul 17, 2013, 07:00 pm EST Two security researchers announced that they have succeeded to transform Verizon mobile phones into spy tools to track Verizon’s users. The security experts revealed […]

Posted in Uncategorized | Comments Off on Researchers can hack Verizon Wireless femtocells to spy on customers

Oil & Natural Gas Cyber Security – CYpBER 2013

When: 20 November, 2013 Where: Nicosia, Cyprus Don’t miss the Oil & Natural Gas Cyber Security – CYpBER 2013 – Nicosia, Cyprus. Cyber-attacks in Oil and Natural Gas trade, will have major […]

Posted in Uncategorized | Comments Off on Oil & Natural Gas Cyber Security – CYpBER 2013

Cybercriminals Leveraging Facebook is the title of a research

Jul 15, 2013, 11:30 am EST Cybercriminals Leveraging Facebook is the title of a research that provided evidence that criminal organizations are exploiting Facebook for illegal activities. Cybercriminals Leveraging Facebook, this […]

Posted in Uncategorized | Comments Off on Cybercriminals Leveraging Facebook is the title of a research

Are You Inviting Hackers into Your Network?

by Peter Martini, COO iboss Security It no longer requires high tech tools to hijack an imperiled network.  Are you using a traditional MDM solution?  You could be leaving the […]

Posted in Cyber Security News | Comments Off on Are You Inviting Hackers into Your Network?

Hackers hit South Korea also spread spyware to steal military secrets

Jul 11, 2013, 11:00 am EST Mac Afee Lab experts revealed that hackers behind large scale cyber-attacks against South Korea also designed malware to steal military secrets. The hackers behind […]

Posted in Uncategorized | Comments Off on Hackers hit South Korea also spread spyware to steal military secrets

The cybercrime ecosystem, resources,motivations and methods

Jul 10, 2013, 11:00 am EST Information provided by the results of principal researches on the cybercrime reveals resources,motivations and methods and cost illegal operations. Fortinet has published early 2013 […]

Posted in Uncategorized | Comments Off on The cybercrime ecosystem, resources,motivations and methods

Android Hack-Tool discovered by F-Secure

Jul 9, 2013, 11:30 am EST Android Hack-Tool discovered by F-Secure confirming that cyber threats targeting Android devices are rapidly growing in quantity and sophistication level. F-Secure have recently announced […]

Posted in Uncategorized | Comments Off on Android Hack-Tool discovered by F-Secure

Best Practices for Keeping Assets Safe In Virtualized Data Centers

Jul 8, 2013, 05:00 pm EST Virtualization has redefined the data center and, in so doing, created a new approach to network architecture. An environment that converts servers into files, […]

Posted in Uncategorized | Comments Off on Best Practices for Keeping Assets Safe In Virtualized Data Centers

DropBox account hacking bypassing two-factor authentication

Jul 8, 2013, 11:30 am EST Zouheir Abdallah revealed that a hacker already knows the victim’s credentials for Dropbox account that has 2FA authentication enabled, is able to hack it. […]

Posted in Uncategorized | Comments Off on DropBox account hacking bypassing two-factor authentication

Self-propagating ZeuS source code offered for sale

By Pierluigi Paganini, Editor-in-Chief, CDM Jul 5, 2013, 11:30 am EST A new variant of Zeus Trojan is offered for sale in the underground. It is a Self-propagating version that […]

Posted in Uncategorized | Comments Off on Self-propagating ZeuS source code offered for sale

Android botnets on the rise

By Pierluigi Paganini, Editor-in-Chief, CDM Jul 3, 2013, 11:00 am EST Principal Security experts are confident that in the next months we will assist to the explosion for Android botnets […]

Posted in Uncategorized | Comments Off on Android botnets on the rise

SIM Card Forensics

Jul 02, 2013, 04:30 pm EST There are a number of reasons that make SIM card forensics an interesting topic; here are a few of them: Popularity: almost everyone has a […]

Posted in Uncategorized | Comments Off on SIM Card Forensics

Stellar Wind, Prism,EvilOlive,ShellTrumpet, US massive surveillance

By Pierluigi Paganini, Editor-in-Chief, CDM Jul 2, 2013, 11:00 am EST Stellar Wind, Prism,EvilOlive, ShellTrumpet are the names of some of the US massive surveillance programs revealed recently by the […]

Posted in Uncategorized | Comments Off on Stellar Wind, Prism,EvilOlive,ShellTrumpet, US massive surveillance

Two-factor Authentication for SMBs

By Pierluigi Paganini, Editor-in-Chief, CDM Jul 1, 2013, 11:30 am EST Two-factor Authentication for SMBs The purpose of this article is to cover the challenges SMBs are facing when it […]

Posted in Uncategorized | Comments Off on Two-factor Authentication for SMBs

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X