Yearly Archives: 2013
FireEye revealed APT Operation Deputy Dog against Japanese entities
Sep 24, 2013, 12:00 pm EST Security experts at FireEye discovered the Operation DeputyDog against Japanese entities that exploits Zero-Day (CVE-2013-3893) recently announced by Microsoft. FireEye announced the discovery of the cyberespionage Operation DeputyDog leveraging […]
NSA tried to insert backdoor into Linux
Sep 23, 2013, 11:45 am EST Linux Torvalds during last LinixCon admitted to have received pressure from US Intelligence to insert a backdoor into Linux. Linux Torvalds during a question-and-answer session […]
12th ANNUAL ANTI-MONEY LAUNDERING AND FINANCIAL CRIMES CONFERENCE
Largest Conference for Financial Crime Detection and Prevention Professionals Debuts Virtual Attendance Option TO ADDRESS GLOBAL FINANCIAL CRIME RISKS Miami, FL — September 18, 2013 – The Association of Certified […]
Microsoft confirmed existence of a new IE zero
Sep 19, 2013, 11:30 am EST Microsoft announced to be aware of a new IE Zero Day vulnerability (CVE-2013-3893) that affects Windows browsers IE 8 and IE 9 recently targeted […]
CBMEN, DARPA’s peer-to-peer technology for battlefield
Sep 18, 2013, 12:45 pm EST DARPA is conducting a program codenamed CBMEN (Content-Based Mobile Edge Networking) for sharing of reconnaissance and Intelligence data on battlefield through P2P technology. DARPA […]
Belgacom hack, state-sponsored attack hypothesis
Sep 17, 2013, 11:30 am EST Belgacom hack, the telecommunications company found evidence of digital intrusion in the company systems, many experts believe in a state-sponsored attack. Belgacom hack, the largest telecommunications […]
Kaspersky reveals Kimsuky operation that is targeting South Korea.
Sep 16, 2013, 11:00 am EST After months of investigation security researchers from Kaspersky have detected a new cyber espionage campaign dubbed Kimsuky that targeted South Korean organizations. Kaspersky experts […]
A look to Android offer in the underground mobile market
Sep 13, 2013, 03:30 pm EST Security experts continue to observe the evolution of the offer of services and malicious software for fraudsters in the Android underground mobile market. In the last […]
Mevade botnet responsible for the spike in Tor traffic
Sep 12, 2013, 11:30 am EST Security researchers at Fox-IT firm found evidence that the spike in Tor traffic is caused by a Mevade botnet that hides its C&C in the anonymizing network. Is the Mevade malware the […]
Hesperbot, the new powerful banking Trojan found by ESET
Sep 11, 2013, 11:30 am EST Hesperbot is the name of a new banking Trojan detected by ESET, it is a very potent malware which includes some very advanced tricks. Hesperbot is the name of the […]
Surveillance – NSA can access data on your mobile device
Sep 10, 2013, 11:30 am EST The German news agency Der Spiegel reported last act of US surveillance, the NSA is able to access data stored in a wide range of mobile devices including […]
NetTraveler APT hackers still active improved their attacks
Sep 9, 2013, 11:30 am EST Experts at Kaspersky firm provided evidences that the hackers behind cyber espionage campaign NetTraveler are still active and improved their attack methods. Last June Kaspersky firm […]
Traffic Correlation Attacks against Anonymity on Tor
Sep 6, 2013, 11:30 am EST The researchers led by Aaron Johnson of the Naval Research Laboratory published the paper on Traffic Correlation Attacks against Anonymity on Tor. Anonymity on Tor […]
Why SQL injection is the cybercriminals weapon of choice
Sep 4, 2013, 03:00 pm EST By Michael Sabo, VP of Marketing, DB Networks Fifteen years on, organizations still struggle with the SQL injection threat. There’s a sinking feeling you get […]
A False Lens of Security
Sep 4, 2013, 02:30 pm EST By Nicole Vincent Fleming Thinking of buying an IP camera to keep an eye on your home or business when you’re away? Or maybe you‘ve […]
Reversing Dropbox client code raises security issues
Sep 4, 2013, 11:30 am EST Researchers at last USENIX security symposium presented a new method and consolidated techniques for reversing Dropbox code to bypass Dropbox’s two factor authentication, hijack […]
PRISM repercussion on the Tor network accesses
Sep 3, 2013, 11:30 am EST The article proposes the analysis of the impact on the use of the Tor network after the events related to PRISM surveillance program disclosure. […]
Cybercrime abuses Facebook paid advertisements
Sep 2, 2013, 11:00 am EST A reading of an interesting study on the criminal abuse of Facebook’s Paid “Sponsor Ads” system to deliver nefarious websites to the users. In […]
China hit by DDoS attack. The Internet inaccessible for hours
Aug 30, 2013, 11:30 am EST China hit by DDoS attack. The CINIC confirmed that the country suffered a DDoS attack over the weekend causing the Internet inaccessibility for hours. […]
Poison Ivy still alive … old malware new cyber threats
Aug 29, 2013, 11:30 am EST Security vendor FireEye has published a detailed analysis on the popular Poison Ivy RAT, releasing also a set of tools to analyze infections. Security […]
Top Five Things You Should Do To Protect Your SmartPhone
Aug 28, 2013, 01:00 pm EST By Gary S. Miliefsky, CISSP®, President www.snoopwall.com While I could suggest you rootkit your device, install IP Tables and Tripwire for your Android smartphone, […]
Brain hacking, it’s time to protect our mind from hackers
Aug 28, 2013, 11:00 am EST Brain hacking is the act to read the content of the human brain and modify it, is the technology mature to allow hackers to penetrate our […]
Information Warfare, Russia, New Zealand…it is arms race
Aug 27, 2013, 11:30 am EST Information warfare, under this term governments are working to improve their cyber capabilities, last in order of time are Russia and the New Zealand. […]
DDoS to hide attacks against wire payment switch systems
Aug 26, 2013, 11:30 am EST Fraudsters target wire payment switch at US banks to steal millions using DDoS to divert the attention on fraudulent transactions. Cybercriminals are targeting the wire payment switch […]
Firefox Zero-day vulnerability against Tor anonymity network
Aug 23, 2013, 11:00 am EST Security researchers found a malicious script that takes advantage of a Firefox Zero-day to identify some users of the Tor anonymity network. My readers know […]
USB Internet Modems vulnerability exposes Millions of PCs
Aug 22, 2013, 11:00 am EST The Indian security expert ‘Rahul Sasi’ found a USB Internet Modems vulnerability that could allow gaining Meterpreter shell or full access to the victim […]
ENISA Annual Incident Reports 2012
Aug 21, 2013, 11:30 am EST ENISA issued the ENISA Annual Incident Reports 2012 on significant incidents in the electronic communications sector, which were reported to national regulators in 2012. ENISA published the […]
Android malware uses Google Cloud Messaging Service as C&C Server
Aug 20, 2013, 11:00 am EST Security experts at Kaspersky have detected numerous Android malicious applications that use Google Cloud Messaging Service as C&C. Android malware exploits the Google Cloud Messaging Service (GCM) as Command and […]
Chinese hackers that hit NYT evolving their techniques
Aug 19, 2013, 01:30 pm EST FireEye security experts discovered a new series of cyber-attacks conducted by Chinese hackers targeted the US media in 2012; the attackers have improved the […]
Android wallet apps vulnerability could allow currency theft
Aug 16, 2013, 11:30 am EST Bitcoin.org has released a security advisory related to a serious security flaw related to Android wallet apps that could allow money theft. Yesterday I’ve […]