Monthly Archives: January 2014

FBI seized Tormail database, it has the access to all users emails

9:30 ET, 31 January 2014 The Federal Bureau of Investigation (FBI) seized the database of Tormail service for its investigation on cybercrime and illegal online hacking. Do you have used the Tormail Email service to […]

Posted in Cyber Security News | Comments Off on FBI seized Tormail database, it has the access to all users emails

More than 350,000 Android devices impacted by bootkit trojan

10:30 ET, 30 January 2014 A particularly clever trojan has been discovered operating as a bootkit on more than 350,000 Android mobile devices, including a small percentage in the United […]

Posted in Cyber Security News | Comments Off on More than 350,000 Android devices impacted by bootkit trojan

Israeli Defense computer hacked via spear phishing attack

9:00 ET, 30 January 2014 Aviv Raff, CTO at Seculert, confirmed that the attackers have penetrated into the network of Israeli Defense accessing to 15 computers. Israeli Defense is another […]

Posted in Cyber Security News | Comments Off on Israeli Defense computer hacked via spear phishing attack

Discovered first Win trojan to serve banking Android malware on mobile

10:00 ET, 29 January 2014 Symantec experts recently came across a Windows malicious code that attempts to infect connected Android devices serving an Android malware. Researchers at Symantec antivirus firm have discovered a malicious code […]

Posted in Cyber Security News | Comments Off on Discovered first Win trojan to serve banking Android malware on mobile

Spear phishing against Microsoft, exposed law enforcement inquiries

9:00 ET, 28 January 2014 Attackers breached the email accounts of Microsoft staff, probably with a spear phishing attack, accessing to documents on law enforcement inquiries. Spear phishing attacks are within […]

Posted in Cyber Security News | Comments Off on Spear phishing against Microsoft, exposed law enforcement inquiries

Arts and crafts retailer Michaels Stores Inc warns over credit card fraud

10:00 ET, 27 January 2014 Michaels Stores Inc., US-based arts-and-crafts retailer, confirmed it is investigating a possible data breach affecting customer cards. Michaels Stores Inc., US-based arts-and-crafts retailer maybe is […]

Posted in Cyber Security News | Comments Off on Arts and crafts retailer Michaels Stores Inc warns over credit card fraud

Privacy violation: NSA is not the only eavesdropper

11:00 ET, 24 January 2014 Privacy violation: NSA is not the only eavesdropper The hue and cry over the actions of NSA is making the headlines regularly these days, with […]

Posted in Cyber Security News | Comments Off on Privacy violation: NSA is not the only eavesdropper

Who is spying Tor on network exit nodes from Russia?

10:00 ET, 24 January 2014 Researchers Winter and Lindskog identified 25 nodes of Tor network that tampered with web traffic, decrypted the traffic, or censored websites. Two researchers, Philipp Winter […]

Posted in Cyber Security News | Comments Off on Who is spying Tor on network exit nodes from Russia?

Weak passwords, in 2013 it is still a frequent error

12:00 ET, 23 January 2014 SplashData has issued its Annual “25 Worst Passwords of the Year” enumerating the list of the most common password chosen by users. It was October […]

Posted in Cyber Security News | Comments Off on Weak passwords, in 2013 it is still a frequent error

An increasing number of targeted attacks against the energy sector

10:00 ET, 21 January 2014 Symantec published in the report titled “Targeted Attacks Against the Energy Sector” to describe the security landscape for companies of the sector. Companies and industries […]

Posted in Cyber Security News | Comments Off on An increasing number of targeted attacks against the energy sector

IoT – Discovered first Internet of Things cyberattack on large-scale

10:00 ET, 20 January 2014 Proofpoint discovered more Than 750,000 Phishing and SPAM Emails Launched From “Thingbots” Including Televisions, Fridge Recently security researchers from Proofpoint uncovered a cyber attack against the Internet of […]

Posted in Cyber Security News | Comments Off on IoT – Discovered first Internet of Things cyberattack on large-scale

CDM Newsflash: TeamBerserk Hacked DHS Fusion Center Documents

Hackers from the group TeamBerserk announced to have leaked numerous sensitive documents from systems of some DHS Intelligence Fusion Centers. January 20, 2014  1:00 AM EST The Group of hackers […]

Posted in Cyber Security News | Comments Off on CDM Newsflash: TeamBerserk Hacked DHS Fusion Center Documents

Internet of Things and principal cyber threats

10:00 ET, 17 January 2014 Internet of Things, a business growing at a compound annual rate of 7,9%, which are the principal cyber threats to the popular paradigm? Another week […]

Posted in Cyber Security News | Comments Off on Internet of Things and principal cyber threats

Kaspersky discovered Icefog Hit US energy companies with Java Backdoor

10:00 ET, 16 January 2014 Kaspersky experts discovered a java version of icefog espionage campaign that targeted at least 3 us oil, gas companies spreading a backdoor dubbed Javafog. Kaspersky […]

Posted in Cyber Security News | Comments Off on Kaspersky discovered Icefog Hit US energy companies with Java Backdoor

After Target also Neiman Marcus retailer confirmed a data breach

9:30 ET, 15 January 2014 Neiman Marcus retailer confirmed a data breach, it is the second case in a few weeks after data breach at US retailer Target discovered Brian […]

Posted in Cyber Security News | Comments Off on After Target also Neiman Marcus retailer confirmed a data breach

Cisco confirmed that a Backdoor affects small business devices

8:30 ET, 14 January 2014 Cisco confirmed the presence of a Backdoor that affects small business devices. The flaw was discovered by the French hacker Eloi Vanderbeken weeks ago. Cisco […]

Posted in Cyber Security News | Comments Off on Cisco confirmed that a Backdoor affects small business devices

Microsoft hacked by Syrian Electronic Army for second time in 2014

10:00 ET, 13 January 2014 Microsoft hacked by Syrian Electronic Army for second time in 2014, MSFTNews Twitter account hijacked, sends out SEA messages. Again Syrian Electronic Army, the popular […]

Posted in Cyber Security News | Comments Off on Microsoft hacked by Syrian Electronic Army for second time in 2014

What the Average Joe should know about NSA

What the Average Joe should know about NSA The National Security Agency has attracted the ire of the public recently. The actions of the organization have been justified time and […]

Posted in Uncategorized | Comments Off on What the Average Joe should know about NSA

openSUSE Forum hacked. Pakistani hacker compromised internal database

11:00 ET, 9 January 2014 A Pakistani hacker named ‘H4x0r HuSsY’ has successfully compromised the official Forum of the popular Linux OS openSUSE accessing to the database. A Pakistani hacker […]

Posted in Cyber Security News | Comments Off on openSUSE Forum hacked. Pakistani hacker compromised internal database

Project NETRA – The Indian Internet Surveillance

10:00 ET, 8 January 2014 Indian Government is launching Netra project for internet surveillance. Obvious concerns for online privacy and freedom of expression of Indian population. The Indian Government is […]

Posted in Cyber Security News | Comments Off on Project NETRA – The Indian Internet Surveillance

Malware served through Yahoo advertisements

10:00 ET, 7 January 2014 Dutch security firm Fox IT discovered an ongoing malware-based attack hit thousands of Yahoo users via malicious ads. Users are alerted. Since the December 30th […]

Posted in Cyber Security News | Comments Off on Malware served through Yahoo advertisements

Quantum computer is the future weapon of NSA

10:00 ET, 6 January 2014 The Washington post revealed that NSA is spending a great effort to build a quantum computer that could break most types of encryption. The NSA […]

Posted in Cyber Security News | Comments Off on Quantum computer is the future weapon of NSA

DROPOUTJEEP – How NSA completely controls your iPhone

14:00 ET, 4 January 2014 Leaked documents shared by Der Spiegel show how NSA spyware codenamed DROPOUTJEEP can spy on every Apple iPhone. Apple denies any claim. Users buy the […]

Posted in Cyber Security News | Comments Off on DROPOUTJEEP – How NSA completely controls your iPhone

Skype’s blog and Twitter account compromised by Syrian Electronic Army hackers

12:00 ET, 3 January 2014 The Syrian Electronic Army (SEA) have compromised Skype ‘s Twitter account and blog to protest against the support provided to NSA surveillance programme. Syrian Electronic […]

Posted in Cyber Security News | Comments Off on Skype’s blog and Twitter account compromised by Syrian Electronic Army hackers

Snapchat users menaced by a couple of malicious exploits

9:30 ET, 2 January 2014 Gibson Security revealed that The ‘Find Friends’ exploit and the ‘Bulk Registration’ Exploit menace the security and privacy of million of Snapchat users. Gibson Security […]

Posted in Cyber Security News | Comments Off on Snapchat users menaced by a couple of malicious exploits

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X