Yearly Archives: 2013

FireEye revealed APT Operation Deputy Dog against Japanese entities

Sep 24, 2013, 12:00 pm EST Security experts at FireEye discovered the Operation DeputyDog against Japanese entities that exploits Zero-Day (CVE-2013-3893) recently announced by Microsoft. FireEye announced the discovery of the cyberespionage Operation DeputyDog leveraging […]

Posted in Cyber Security News | Comments Off on FireEye revealed APT Operation Deputy Dog against Japanese entities

NSA tried to insert backdoor into Linux

Sep 23, 2013, 11:45 am EST Linux Torvalds during last LinixCon admitted to have received pressure from US Intelligence to insert a backdoor into Linux. Linux Torvalds during a question-and-answer ‪session […]

Posted in Cyber Security News | Comments Off on NSA tried to insert backdoor into Linux

12th ANNUAL ANTI-MONEY LAUNDERING AND FINANCIAL CRIMES CONFERENCE

Largest Conference for Financial Crime Detection and Prevention Professionals Debuts Virtual Attendance Option TO ADDRESS GLOBAL FINANCIAL CRIME RISKS Miami, FL — September 18, 2013 – The Association of Certified […]

Posted in Cyber Security News | Comments Off on 12th ANNUAL ANTI-MONEY LAUNDERING AND FINANCIAL CRIMES CONFERENCE

Microsoft confirmed existence of a new IE zero

Sep 19, 2013, 11:30 am EST Microsoft announced to be aware of a new IE Zero Day vulnerability (CVE-2013-3893) that affects Windows browsers IE 8 and IE 9 recently targeted […]

Posted in Cyber Security News | Comments Off on Microsoft confirmed existence of a new IE zero

CBMEN, DARPA’s peer-to-peer technology for battlefield

Sep 18, 2013, 12:45 pm EST DARPA is conducting a program codenamed CBMEN (Content-Based Mobile Edge Networking) for sharing of reconnaissance and Intelligence data on battlefield through P2P technology. DARPA […]

Posted in Cyber Security News | Comments Off on CBMEN, DARPA’s peer-to-peer technology for battlefield

Belgacom hack, state-sponsored attack hypothesis

Sep 17, 2013, 11:30 am EST Belgacom hack, the telecommunications company found evidence of digital intrusion in the company systems, many experts believe in a state-sponsored attack. Belgacom hack, the largest telecommunications […]

Posted in Cyber Security News | Comments Off on Belgacom hack, state-sponsored attack hypothesis

Kaspersky reveals Kimsuky operation that is targeting South Korea.

Sep 16, 2013, 11:00 am EST After months of investigation security researchers from Kaspersky have detected a new cyber espionage campaign dubbed Kimsuky that targeted South Korean organizations. Kaspersky experts […]

Posted in Cyber Security News | Comments Off on Kaspersky reveals Kimsuky operation that is targeting South Korea.

A look to Android offer in the underground mobile market

Sep 13, 2013, 03:30 pm EST Security experts continue to observe the evolution of the offer of services and malicious software for fraudsters in the Android underground mobile market. In the last […]

Posted in Cyber Security News | Comments Off on A look to Android offer in the underground mobile market

Mevade botnet responsible for the spike in Tor traffic

Sep 12, 2013, 11:30 am EST Security researchers at Fox-IT firm found evidence that the spike in Tor traffic is caused by a Mevade botnet that hides its C&C in the anonymizing network. Is the Mevade malware the […]

Posted in Cyber Security News | Comments Off on Mevade botnet responsible for the spike in Tor traffic

Hesperbot, the new powerful banking Trojan found by ESET

Sep 11, 2013, 11:30 am EST Hesperbot is the name of a new banking Trojan detected by ESET, it is a very potent malware which includes some very advanced tricks. Hesperbot is the name of the […]

Posted in Cyber Security News | Comments Off on Hesperbot, the new powerful banking Trojan found by ESET

Surveillance – NSA can access data on your mobile device

Sep 10, 2013, 11:30 am EST The German news agency Der Spiegel reported last act of US surveillance, the NSA is able to access data stored in a wide range of mobile devices including […]

Posted in Cyber Security News | Comments Off on Surveillance – NSA can access data on your mobile device

NetTraveler APT hackers still active improved their attacks

Sep 9, 2013, 11:30 am EST Experts at Kaspersky firm provided evidences that the hackers behind cyber espionage campaign NetTraveler are still active and improved their attack methods. Last June Kaspersky firm […]

Posted in Uncategorized | Comments Off on NetTraveler APT hackers still active improved their attacks

Traffic Correlation Attacks against Anonymity on Tor

Sep 6, 2013, 11:30 am EST The researchers led by Aaron Johnson of the Naval Research Laboratory published the paper on Traffic Correlation Attacks against Anonymity on Tor. Anonymity on Tor […]

Posted in Uncategorized | Comments Off on Traffic Correlation Attacks against Anonymity on Tor

Why SQL injection is the cybercriminals weapon of choice

Sep 4, 2013, 03:00 pm EST By Michael Sabo, VP of Marketing,  DB Networks Fifteen years on, organizations still struggle with the SQL injection threat. There’s a sinking feeling you get […]

Posted in Uncategorized | Comments Off on Why SQL injection is the cybercriminals weapon of choice

A False Lens of Security

Sep 4, 2013, 02:30 pm EST By Nicole Vincent Fleming Thinking of buying an IP camera to keep an eye on your home or business when you’re away? Or maybe you‘ve […]

Posted in Uncategorized | Comments Off on A False Lens of Security

Reversing Dropbox client code raises security issues

Sep 4, 2013, 11:30 am EST Researchers at last USENIX security symposium presented a new method and consolidated techniques for reversing Dropbox code to bypass Dropbox’s two factor authentication, hijack […]

Posted in Uncategorized | Comments Off on Reversing Dropbox client code raises security issues

PRISM repercussion on the Tor network accesses

Sep 3, 2013, 11:30 am EST The article proposes the analysis of the impact on the use of the Tor network after the events related to PRISM surveillance program disclosure. […]

Posted in Uncategorized | Comments Off on PRISM repercussion on the Tor network accesses

Cybercrime abuses Facebook paid advertisements

Sep 2, 2013, 11:00 am EST A reading of an interesting study on the criminal abuse of Facebook’s Paid “Sponsor Ads” system to deliver nefarious websites to the users. In […]

Posted in Uncategorized | Comments Off on Cybercrime abuses Facebook paid advertisements

China hit by DDoS attack. The Internet inaccessible for hours

Aug 30, 2013, 11:30 am EST China hit by DDoS attack. The CINIC confirmed that the country suffered a DDoS attack over the weekend causing the Internet inaccessibility for hours. […]

Posted in Uncategorized | Comments Off on China hit by DDoS attack. The Internet inaccessible for hours

Poison Ivy still alive … old malware new cyber threats

Aug 29, 2013, 11:30 am EST Security vendor FireEye has published a detailed analysis on the popular Poison Ivy RAT, releasing also a set of tools to analyze infections. Security […]

Posted in Uncategorized | Comments Off on Poison Ivy still alive … old malware new cyber threats

Top Five Things You Should Do To Protect Your SmartPhone

Aug 28, 2013, 01:00 pm EST By Gary S. Miliefsky, CISSP®, President www.snoopwall.com While I could suggest you rootkit your device, install IP Tables and Tripwire for your Android smartphone, […]

Posted in Uncategorized | Comments Off on Top Five Things You Should Do To Protect Your SmartPhone

Brain hacking, it’s time to protect our mind from hackers

Aug 28, 2013, 11:00 am EST Brain hacking is the act to read the content of the human brain and modify it, is the technology mature to allow hackers to penetrate our […]

Posted in Uncategorized | Comments Off on Brain hacking, it’s time to protect our mind from hackers

Information Warfare, Russia, New Zealand…it is arms race

Aug 27, 2013, 11:30 am EST Information warfare, under this term governments are working to improve their cyber capabilities, last in order of time are Russia and the New Zealand. […]

Posted in Uncategorized | Comments Off on Information Warfare, Russia, New Zealand…it is arms race

DDoS to hide attacks against wire payment switch systems

Aug 26, 2013, 11:30 am EST Fraudsters target wire payment switch at US banks to steal millions using DDoS to divert the attention on fraudulent transactions. Cybercriminals are targeting the wire payment switch […]

Posted in Uncategorized | Comments Off on DDoS to hide attacks against wire payment switch systems

Firefox Zero-day vulnerability against Tor anonymity network

Aug 23, 2013, 11:00 am EST Security researchers found a malicious script that takes advantage of a Firefox Zero-day to identify some users of the Tor anonymity network. My readers know […]

Posted in Uncategorized | Comments Off on Firefox Zero-day vulnerability against Tor anonymity network

USB Internet Modems vulnerability exposes Millions of PCs

Aug 22, 2013, 11:00 am EST The Indian security expert ‘Rahul Sasi’ found a USB Internet Modems vulnerability that could allow gaining Meterpreter shell or full access to the victim […]

Posted in Uncategorized | Comments Off on USB Internet Modems vulnerability exposes Millions of PCs

ENISA Annual Incident Reports 2012

Aug 21, 2013, 11:30 am EST ENISA issued the ENISA Annual Incident Reports 2012 on significant incidents in the electronic communications sector, which were reported to national regulators in 2012. ENISA published the […]

Posted in Uncategorized | Comments Off on ENISA Annual Incident Reports 2012

Android malware uses Google Cloud Messaging Service as C&C Server

Aug 20, 2013, 11:00 am EST Security experts at Kaspersky have detected numerous Android malicious applications that use Google Cloud Messaging Service as C&C. Android malware exploits the Google Cloud Messaging Service (GCM) as Command and […]

Posted in Uncategorized | Comments Off on Android malware uses Google Cloud Messaging Service as C&C Server

Chinese hackers that hit NYT evolving their techniques

Aug 19, 2013, 01:30 pm EST FireEye security experts discovered a new series of cyber-attacks conducted by Chinese hackers targeted the US media in 2012; the attackers have improved the […]

Posted in Uncategorized | Comments Off on Chinese hackers that hit NYT evolving their techniques

Android wallet apps vulnerability could allow currency theft

Aug 16, 2013, 11:30 am EST Bitcoin.org has released a security advisory related to a serious security flaw related to Android wallet apps that could allow money theft. Yesterday I’ve […]

Posted in Uncategorized | Comments Off on Android wallet apps vulnerability could allow currency theft

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X