Yearly Archives: 2013

FireEye has identified a new IE zero-day exploit

10:00 ET, 14 November 2013 FireEye Labs has identified a new IE zero-day exploit used for a watering hole attack in the US. As usual it is crucial to track and […]

Posted in Cyber Security News | Comments Off on FireEye has identified a new IE zero-day exploit

Google Bot activity abused doing SQL Injection Attacks

10:00 ET, 12 November 2013 Security experts at Securi firm have recently detected a series of SQL Injection attacks conducted abusing of the Google Bot activity. The exploitation of search […]

Posted in Cyber Security News | Comments Off on Google Bot activity abused doing SQL Injection Attacks

Stuxnet infected the network of Russian nuclear facility

10:30 ET, 11 November 2013 Eugene Kaspersky revealed that a staffer at the unnamed nuclear Russian plant informed him of the infection of internal network with Stuxnet. We have a […]

Posted in Cyber Security News | Comments Off on Stuxnet infected the network of Russian nuclear facility

I don’t like – Facebook Clickjacking and track screen cursors

10:30 ET, 8 November 2013 A misleading script to increase the number of “I like” and an invasive technology to track screen cursors are threatening the Facebook users. The social media are […]

Posted in Cyber Security News | Comments Off on I don’t like – Facebook Clickjacking and track screen cursors

A Zero-Day Vulnerability in Microsoft Graphics Component – CVE-2013-3906

10:00 ET, 6 November 2013 Microsoft Zero-day CVE-2013-3906 – Microsoft informed to be aware of a vulnerability in a Microsoft graphics component that is actively exploited in targeted attacks using […]

Posted in Cyber Security News | Comments Off on A Zero-Day Vulnerability in Microsoft Graphics Component – CVE-2013-3906

Finland’s Ministry of Foreign Affairs hit by extensive cyber espionage

14:00 ET, 5 November 2013 Finland’s foreign minister announced that foreign intelligence agents had carried out large-scale cyber espionage into government communications. The Finnish Ministry of Foreign Affair networks has been targeted in […]

Posted in Cyber Security News | Comments Off on Finland’s Ministry of Foreign Affairs hit by extensive cyber espionage

Anonymous OpNSA Campaign – OSINT to predict DDoS attacks on Nov 5th

17:00 ET, 4 November 2013 OpNSA analyzed with OSINT techniques based on the correlation of media activities and physical protests. The analysts provided a forecast on next attacks. Web Intelligence […]

Posted in Cyber Security News | Comments Off on Anonymous OpNSA Campaign – OSINT to predict DDoS attacks on Nov 5th

uProxy, Digital Attack Map and Project Shield,Google to secure the web

1 November 2013, 11:30 EST Google has just revealed the details on tree new technologies, uProxy, Digital Attack Map and Project Shield, to secure the web and to fight censorship. […]

Posted in Cyber Security News | Comments Off on uProxy, Digital Attack Map and Project Shield,Google to secure the web

Israel – AP Exclusive reveals tunnel hit by cyber attack

1 November 2013, 15:30 EST Cybersecurity experts revealed that a major artery in Israel’s national road network located in the northern the city of Haifa suffered a cyber attack. Israel […]

Posted in Cyber Security News | Comments Off on Israel – AP Exclusive reveals tunnel hit by cyber attack

Syrian Electronic Army hacked President Obama website and social media

Syrian Electronic Army hacked President Obama website and social media. Syrian Electronic Army Targeted President Obama’s website, Twitter and Facebook accounts and email account linked to his non-profit activities. Once […]

Posted in Cyber Security News | Comments Off on Syrian Electronic Army hacked President Obama website and social media

LinkedIn Intro iOS app intercept user’s emails in iPhone and much more

LinkedIn Intro iOS app intercept user’s emails in iPhone and much more LinkedIn launched LinkedIn Intro app for iOS to show LI profiles right inside the native iPhone mail client. […]

Posted in Cyber Security News | Comments Off on LinkedIn Intro iOS app intercept user’s emails in iPhone and much more

Android Wroba banking trojan targeted Korean users

October 25, 2013 – The Antivirus vendor Malwarebytes revealed that the Wroba banking trojan distributed via file sharing sites and alternative markets targeted Korean users. Today I presented at Cyber […]

Posted in Cyber Security News | Comments Off on Android Wroba banking trojan targeted Korean users

Root access backdoor discovered in Chinese Tenda Wireless Routers

Root access backdoor discovered in Chinese Tenda Wireless Routers Craig Heffner has discovered a new backdoor in the Wireless Routers produced by China based networking device and equipment manufacturer Tenda […]

Posted in Cyber Security News | Comments Off on Root access backdoor discovered in Chinese Tenda Wireless Routers

Verizon Wireless – how a simple bug could cause a disaster

Verizon Wireless – how a simple bug could cause a disaster A researcher discovered a serious vulnerability in Verizon Wireless’s Web-based customer portal that enabled anyone to download user’s SMS […]

Posted in Cyber Security News | Comments Off on Verizon Wireless – how a simple bug could cause a disaster

A backdoor present in many D-Link devices allows to bypass authentication

A backdoor present in many D-Link devices allows to bypass authentication Researcher Craig published an interesting blog post on “/dev/ttyS0” on the reverse engineering of the backdoor present in many D-Link […]

Posted in Cyber Security News | Comments Off on A backdoor present in many D-Link devices allows to bypass authentication

Google Chrome users are vulnerable to sensitive data theft

Google Chrome users are vulnerable to sensitive data theft Security experts at Identity Finder demonstrated that Google Chrome users are vulnerable to sensitive Data Theft because the browser stores it […]

Posted in Cyber Security News | Comments Off on Google Chrome users are vulnerable to sensitive data theft

How to exploit iFramed based traffic E-shop for illegal activities

17 October 2013 16:00 EST How to exploit iFramed based traffic E-shop for illegal activities What is an E-shop for iFramed traffic and how does cybercrime exploit it? In this post thanks to […]

Posted in Cyber Security News | Comments Off on How to exploit iFramed based traffic E-shop for illegal activities

Blackhole author arrested. The impact on the underground market

Blackhole author arrested. The impact on the underground market The author of the Blackhole exploits kit has been arrested after a long investigation. What will change in the offer of […]

Posted in Cyber Security News | Comments Off on Blackhole author arrested. The impact on the underground market

2013 Norton Report, the impact of cybercrime according Symantec

2013 Norton Report, the impact of cybercrime according Symantec Symantec issued 2013 Norton Report, the annual research study which examines the consumers’ online behaviors, the dangers and financial cost of […]

Posted in Cyber Security News | Comments Off on 2013 Norton Report, the impact of cybercrime according Symantec

Ponemon Institute issued the 2013 Cost of Cyber Crime Study

Ponemon Institute issued the 2013 Cost of Cyber Crime Study HP sponsored a study of Ponemon Institute that reveals Cost of Cybercrime in 2013 escalates 78 Percent while Time to Resolve Attacks […]

Posted in Cyber Security News | Comments Off on Ponemon Institute issued the 2013 Cost of Cyber Crime Study

How to create undetectable malware with Mac encryption mechanism

How to create undetectable malware with Mac encryption mechanism Researcher Daniel Pistelli demonstrated how to exploit Mac internally encryption mechanism to create an undetectable Mac OS X Malware.   During the […]

Posted in Cyber Security News | Comments Off on How to create undetectable malware with Mac encryption mechanism

Upcoming Awards

1st Annual Hot Companies, Best Products and Most Innovative New InfoSec Technologies Awards To Be Held During RSA Conference 2014, as an RSA Conference 2014 Gold Media Sponsor Instructions for […]

Posted in Uncategorized | Comments Off on Upcoming Awards

How NSA tries to compromise Tor anonymity. Tor Stinks document

How NSA tries to compromise Tor anonymity. Tor Stinks document Top-secret presentation Tor Stinks leaked by Snowden shows the techniques implemented by the NSA to overwhelm Tor Anonymity with manual analysis. Tor anonymity […]

Posted in Cyber Security News | Comments Off on How NSA tries to compromise Tor anonymity. Tor Stinks document

Adobe security breach, hackers steal 2.9M accounts and source code

Adobe security breach, hackers steal 2.9M accounts and source code Adobe reveals customer data stolen in security breach, hackers have accessed sensitive information for 2.9 million users and to the […]

Posted in Cyber Security News | Comments Off on Adobe security breach, hackers steal 2.9M accounts and source code

Proxy.sh – Can you trust your VPN provider? Maybe …

Proxy.sh – Can you trust your VPN provider? Maybe … Proxy.sh VPN service with no-logging policy announced to have sniffed the traffic of US based server to Catch Hackers. Can […]

Posted in Cyber Security News | Comments Off on Proxy.sh – Can you trust your VPN provider? Maybe …

F-Secure published Threat Report H1 2013 on security landscape

F-Secure published Threat Report H1 2013 on security landscape Oct 2, 2013 @ 11:10 IT security firm F-Secure has published its Threat Report H1 2013, the document proposes a focus on […]

Posted in Cyber Security News | Comments Off on F-Secure published Threat Report H1 2013 on security landscape

Criminals hacked illegal service exposing Americans to Identity theft

Oct 01, 2013, 10:00 am EST An identity theft service that sells personal information on millions of US citizens has been hacked. Millions of US citizens exposed to Id Theft. […]

Posted in Cyber Security News | Comments Off on Criminals hacked illegal service exposing Americans to Identity theft

Chinese hackers increasingly attracted to the drone technology

Sep 27, 2013, 12:00 pm EST Intelligence agencies reveal that Chinese hackers increasingly attracted to the drone technology while Chinese drone industry grows like never before! The fact that Chinese […]

Posted in Cyber Security News | Comments Off on Chinese hackers increasingly attracted to the drone technology

No good news from ENISA Threat Landscape Mid year 2013

Sep 26, 2013, 11:00 am EST ENISA Threat Landscape Mid year 2013 presents top cyber threats, anticipating its interim Threat Landscape 2013 report. The study reveals concerning trends. ENISA published a […]

Posted in Cyber Security News | Comments Off on No good news from ENISA Threat Landscape Mid year 2013

Chaos Computer Club claims to have defeated Apple TouchID

Sep 25, 2013, 11:30 am EST Chaos Computer Club claims to have bypassed the biometric security technology Apple TouchID by making a copy of a fingerprint photographed on a glass surface. […]

Posted in Cyber Security News | Comments Off on Chaos Computer Club claims to have defeated Apple TouchID

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X