Monthly Archives: September 2013

Chinese hackers increasingly attracted to the drone technology

Sep 27, 2013, 12:00 pm EST Intelligence agencies reveal that Chinese hackers increasingly attracted to the drone technology while Chinese drone industry grows like never before! The fact that Chinese […]

Posted in Cyber Security News | Comments Off on Chinese hackers increasingly attracted to the drone technology

No good news from ENISA Threat Landscape Mid year 2013

Sep 26, 2013, 11:00 am EST ENISA Threat Landscape Mid year 2013 presents top cyber threats, anticipating its interim Threat Landscape 2013 report. The study reveals concerning trends. ENISA published a […]

Posted in Cyber Security News | Comments Off on No good news from ENISA Threat Landscape Mid year 2013

Chaos Computer Club claims to have defeated Apple TouchID

Sep 25, 2013, 11:30 am EST Chaos Computer Club claims to have bypassed the biometric security technology Apple TouchID by making a copy of a fingerprint photographed on a glass surface. […]

Posted in Cyber Security News | Comments Off on Chaos Computer Club claims to have defeated Apple TouchID

FireEye revealed APT Operation Deputy Dog against Japanese entities

Sep 24, 2013, 12:00 pm EST Security experts at FireEye discovered the Operation DeputyDog against Japanese entities that exploits Zero-Day (CVE-2013-3893) recently announced by Microsoft. FireEye announced the discovery of the cyberespionage Operation DeputyDog leveraging […]

Posted in Cyber Security News | Comments Off on FireEye revealed APT Operation Deputy Dog against Japanese entities

NSA tried to insert backdoor into Linux

Sep 23, 2013, 11:45 am EST Linux Torvalds during last LinixCon admitted to have received pressure from US Intelligence to insert a backdoor into Linux. Linux Torvalds during a question-and-answer ‪session […]

Posted in Cyber Security News | Comments Off on NSA tried to insert backdoor into Linux

12th ANNUAL ANTI-MONEY LAUNDERING AND FINANCIAL CRIMES CONFERENCE

Largest Conference for Financial Crime Detection and Prevention Professionals Debuts Virtual Attendance Option TO ADDRESS GLOBAL FINANCIAL CRIME RISKS Miami, FL — September 18, 2013 – The Association of Certified […]

Posted in Cyber Security News | Comments Off on 12th ANNUAL ANTI-MONEY LAUNDERING AND FINANCIAL CRIMES CONFERENCE

Microsoft confirmed existence of a new IE zero

Sep 19, 2013, 11:30 am EST Microsoft announced to be aware of a new IE Zero Day vulnerability (CVE-2013-3893) that affects Windows browsers IE 8 and IE 9 recently targeted […]

Posted in Cyber Security News | Comments Off on Microsoft confirmed existence of a new IE zero

CBMEN, DARPA’s peer-to-peer technology for battlefield

Sep 18, 2013, 12:45 pm EST DARPA is conducting a program codenamed CBMEN (Content-Based Mobile Edge Networking) for sharing of reconnaissance and Intelligence data on battlefield through P2P technology. DARPA […]

Posted in Cyber Security News | Comments Off on CBMEN, DARPA’s peer-to-peer technology for battlefield

Belgacom hack, state-sponsored attack hypothesis

Sep 17, 2013, 11:30 am EST Belgacom hack, the telecommunications company found evidence of digital intrusion in the company systems, many experts believe in a state-sponsored attack. Belgacom hack, the largest telecommunications […]

Posted in Cyber Security News | Comments Off on Belgacom hack, state-sponsored attack hypothesis

Kaspersky reveals Kimsuky operation that is targeting South Korea.

Sep 16, 2013, 11:00 am EST After months of investigation security researchers from Kaspersky have detected a new cyber espionage campaign dubbed Kimsuky that targeted South Korean organizations. Kaspersky experts […]

Posted in Cyber Security News | Comments Off on Kaspersky reveals Kimsuky operation that is targeting South Korea.

A look to Android offer in the underground mobile market

Sep 13, 2013, 03:30 pm EST Security experts continue to observe the evolution of the offer of services and malicious software for fraudsters in the Android underground mobile market. In the last […]

Posted in Cyber Security News | Comments Off on A look to Android offer in the underground mobile market

Mevade botnet responsible for the spike in Tor traffic

Sep 12, 2013, 11:30 am EST Security researchers at Fox-IT firm found evidence that the spike in Tor traffic is caused by a Mevade botnet that hides its C&C in the anonymizing network. Is the Mevade malware the […]

Posted in Cyber Security News | Comments Off on Mevade botnet responsible for the spike in Tor traffic

Hesperbot, the new powerful banking Trojan found by ESET

Sep 11, 2013, 11:30 am EST Hesperbot is the name of a new banking Trojan detected by ESET, it is a very potent malware which includes some very advanced tricks. Hesperbot is the name of the […]

Posted in Cyber Security News | Comments Off on Hesperbot, the new powerful banking Trojan found by ESET

Surveillance – NSA can access data on your mobile device

Sep 10, 2013, 11:30 am EST The German news agency Der Spiegel reported last act of US surveillance, the NSA is able to access data stored in a wide range of mobile devices including […]

Posted in Cyber Security News | Comments Off on Surveillance – NSA can access data on your mobile device

NetTraveler APT hackers still active improved their attacks

Sep 9, 2013, 11:30 am EST Experts at Kaspersky firm provided evidences that the hackers behind cyber espionage campaign NetTraveler are still active and improved their attack methods. Last June Kaspersky firm […]

Posted in Uncategorized | Comments Off on NetTraveler APT hackers still active improved their attacks

Traffic Correlation Attacks against Anonymity on Tor

Sep 6, 2013, 11:30 am EST The researchers led by Aaron Johnson of the Naval Research Laboratory published the paper on Traffic Correlation Attacks against Anonymity on Tor. Anonymity on Tor […]

Posted in Uncategorized | Comments Off on Traffic Correlation Attacks against Anonymity on Tor

Why SQL injection is the cybercriminals weapon of choice

Sep 4, 2013, 03:00 pm EST By Michael Sabo, VP of Marketing,  DB Networks Fifteen years on, organizations still struggle with the SQL injection threat. There’s a sinking feeling you get […]

Posted in Uncategorized | Comments Off on Why SQL injection is the cybercriminals weapon of choice

A False Lens of Security

Sep 4, 2013, 02:30 pm EST By Nicole Vincent Fleming Thinking of buying an IP camera to keep an eye on your home or business when you’re away? Or maybe you‘ve […]

Posted in Uncategorized | Comments Off on A False Lens of Security

Reversing Dropbox client code raises security issues

Sep 4, 2013, 11:30 am EST Researchers at last USENIX security symposium presented a new method and consolidated techniques for reversing Dropbox code to bypass Dropbox’s two factor authentication, hijack […]

Posted in Uncategorized | Comments Off on Reversing Dropbox client code raises security issues

PRISM repercussion on the Tor network accesses

Sep 3, 2013, 11:30 am EST The article proposes the analysis of the impact on the use of the Tor network after the events related to PRISM surveillance program disclosure. […]

Posted in Uncategorized | Comments Off on PRISM repercussion on the Tor network accesses

Cybercrime abuses Facebook paid advertisements

Sep 2, 2013, 11:00 am EST A reading of an interesting study on the criminal abuse of Facebook’s Paid “Sponsor Ads” system to deliver nefarious websites to the users. In […]

Posted in Uncategorized | Comments Off on Cybercrime abuses Facebook paid advertisements

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X