Yearly Archives: 2014
NSA published reports containing declassified compliance errors
The National Security Agency (NSA) has released a collection of compliance reports that details failures and errors in compliance to US laws on surveillance. It’s Christmas time and the National Security […]
Gmail service has been blocked in China
Gmail has been blocked in China, experts speculated that the Chinese Government used the China’s Great Firewall to interfere with the email service. Bad news for Chinese Gmail users, the popular email […]
Lizard Squad took down again Sony PSN and Xbox Live networks
Hackers belonging to the Lizard Squad team have taken down at Christmas the online networks of both Microsoft Xbox Live and PlayStation network (PSN). The Lizard Squad hacking team has taken […]
Eastern APT group Anunak steals millions from banks
Security researchers discovered a criminal crew called Anunak that has already stolen $17 million from banks, retailers and others firms since 2013. Security companies Group-IB and Fox-IT have conducted a […]
ISIS operates spear phishing attacks against a Syrian citizen media group
A Syrian citizen media group critical of ISIS was recently targeted in a spear phishing campaign which aim to de-anonymize its members. The Islamic State in Iraq and Syria (ISIS) […]
Anonymous hacked Swedish government email account in retaliation for the seizure of Pirate Bay servers
Members of the Anonymous collective have hacked several Swedish government email accounts over seizure of The Pirate Bay servers. Many cyber security experts consider hacktivists as a threat that is swarming, but […]
TSPY_BANKER Banking Trojan Targets banks in South Korea
Security experts at Trend Micro detected a new banking trojan dubbed TSPY_BANKER.YYSI which uses Pinterest as command and control system. According to researchers at Trend Micro once again, banks in […]
GCHQ launches Cryptoy mobile app to teach cryptography
Cryptoy is the free educational app about cryptography designed by GCHQ for use by secondary school students and their teachers. The British Intelligence agency GCHQ has launched “Cryptoy”, an Android mobile app that was […]
UK – A new GCHQ-NCA unit will catch pedophiles in the Deep Web
Prime Minister Cameron announced that a newborn cyber unit composed of officials from GCHQ and NCA will fight online pedophiles even in the Deep Web. Prime Minister David Cameron has […]
POODLE SSL flaw is threatening also TLS Security Protocol
Researchers at Qualys revealed that POODLE is likely to hit some of the most popular websites because the flaw also affects implementations of newer TLS. POODLE (Padding Oracle On Downgraded Legacy […]
Stolen Sony certificates used to digitally sign Destover Malware
Security experts at Kaspersky Lab have detected a strain of Destover Malware that has been digitally signed with the certificates stolen during Sony attack. Security experts have detected a new […]
A new Variant of POODLE bug biting 10% of Websites Worldwide.
POODLE bug, a vulnerability in outdated SSL 3.0 web encryption technology, discovered by Google researchers two months ago is still alive and biting over 10% of world’s most popular websites […]
93 percent of Government Chinese websites are vulnerable
A report issued by the China Software Testing Center revealed that 93 percent of Chinese websites are vulnerable to cyber attacks. Nearly 93 percent of 1,000 Chinese government websites under […]
Op AURORAGOLD – NSA hacks cellphone networks worldwide
The Intercept revealed the Op AURORAGOLD run by the NSA to spy on hundreds of companies and organizations to hack cellphone networks worldwide. The Intercept has uncovered details of the operation AURORAGOLD, […]
FBI warns of major malware-based attacks following the Sony Pictures hack
The Reuters has reported that the FBI issued a confidential warning to US businesses following the destructive malware based attack on Sony Pictures. Following the major breach breach at Sony Pictures Entertainment, the […]
Sony Pictures data breach may have exposed staff data and much more
The Sony Pictures Hack was even worse than everyone thought, the hackers have also stolen more than 25 gigabytes of sensitive data. More details are emerging from the investigations on […]
ENISA issued the Evaluation Framework on National Cyber Security Strategies (NCSS)
ENISA has presented at the workshop on National Cyber Security Strategies in Brussels the Evaluation Framework on National Cyber Security Strategies (NCSS). ENISA issued the Evaluation Framework on National Cyber Security […]
Who is GOP? Is North Korea behind the Sony Pictures data breach?
While the GOP crew continues to leak online internal files stolen in the attack on the Sony Pictures, the company is investigating on a link to North Korea. On Saturday the collective […]
Are AnonGhostTeam hacktivists using malware to infect end users?
Experts at Zscaler security firm discovered several websites defaced by AnonGhostTeam hacktivists leading to Dokta Chef Exploit Kit and CVE-2014-6332 Many security experts tend to ridicule the threat of hacktivist […]
Islamic State caught in a cyber-web of its own making
Islamic State caught in a cyber-web of its own making At first glance, cyber security seems far from a decisive factor among the violent brutalities happening in Syria and Iraq […]
Cyber Defense Magazine November 2014
Cyber Warnings November 2014 has arrived. We hope you enjoy this month’s edition.. Check it out and share the e-magazine using the social share options at the bottom of the […]
Regin – Highly advanced spying tool discovered by Symantec
Symantec has uncovered the backdoor Regin, a highly advanced spying tool used in cyber espionage campaigns against governments and infrastructure operators. Backdoor Regin, is the name assigned by the experts […]
British firm now owned by Vodafone aided GCHQ in wiretapping undersea cables
New documents leaked by Snowden reveal the crucial role of a Vodafone-owned company in wiretapping of undersea cables for massive surveillance. According to several secret documents leaked by Edward Snowden US and […]
The US energy industry is constantly under cyber attacks
Data related to the number of incidents occurred to national infrastructure confirms that the US Government energy industry is constantly under attack. The US Government is aware that nation’s energy […]
EASE, the concept of self-repairing networks of the DHS
The Department of Homeland Security is working with industry to the EASE concept, a self-repairing systems able to avoid the interruption of the operations. The Department of Homeland Security is […]
ISIS keeps getting better at avoiding US surveillance
Speaking before the House Armed Services Committee the US Defense is worried by the capabilities of the ISIS members for keeping their communications covert. Last week American officials had yet another […]
State Department network hacked, email system shut down
The State Department has taken the unprecedented step of shutting down its entire unclassified email system in response to a suspected cyber attack. The State Department has decided of shutting down […]
The WSJ revealed that the US authorities coordinated by the Department of Justice has been using airplanes to collect Americans’ cell phone data
A new secret U.S. surveillance program was disclosed in a Wall Street Journal’s report, the post published by the popular media agency reveals the use of bogus cell phone towers installed […]
Internal Internet traffic routed outside Russia by a Chinese operator
Russian Internet Traffic redirected by a Chinese operator due to routing errors caused by a weakness in the Border gateway protocol (BGP). The Russian Internet traffic in several circumstances has been re-routed outside […]
Foreign state suspected of breaching US Postal Service systems
State-sponsored hackers are suspected of breaching the systems of the United States Postal Service exposing the data of more than 800,000 employees. The U.S. Postal Service has suffered a major […]