Monthly Archives: February 2014
Apple restores certificate validation checks mysteriously missed
10:30 ET, 28 February 2014 Apple released a security update to iOS that restores some certificate-validation checks that had apparently been missing for an unspecified amount of time. Last week Apple released […]
iBanking Mobile Bot Source Code available for sale in the underground
9:30 ET, 27 February 2014 iBanking is a new mobile banking Trojan available for sale in the underground for $5,000 according the RSA’s FraudAction Group. The source code for iBanking banking trojan has been […]
South Korea is developing a cyber weapon to hit North Korean nuclear
9:30 ET, 26 February 2014 The South Korea government is working for the development of a cyber weapon to hit North Korean nuclear facilities. It’s Information warfare. The tension between North Korea and South […]
Cyber Defense Magazine Announces Infosec Awards Winners for #RSAC 2014
San Francisco, CA (PRWEB) February 25, 2014 Awards for Next-generation Information Security Solutions Unveiled by CDM® at RSA® Conference 2014 Cyber Defense Magazine, the industry’s leading electronic information security […]
Largest Bitcoin exchange MtGox shut down, earthquake in the Bitcoin industry
10:00 ET, 25 February 2014 Largest Bitcoin exchange MtGox shut down after it had announced to have suffered technical issues that forced the exchange to suspend withdrawals for a week. […]
Banking trojan hit a large number of Islamic Mobile Banking Customers
11:00 ET, 24 February 2014 Security researchers at InterCrawler discovered a Banking trojan which infected a large number of devices the Middle East belonging to Islamic Banks. IntelCrawler cyber intelligence firm discovered […]
Discovered thousands of FTP servers infected by malware
9:30 ET, 21 February 2014 Hold Security reported it has discovered a list of credentials for close to 7,800 FTP servers being circulated in cybercrime forums in the Deep Web. FTP servers […]
FireEye discovered a new watering hole attack based on 0-day exploit
11:00 ET, 20 February 2014 Security researchers from FireEye have recently discovered a new IE 10 Zero-Day exploit being used in a watering hole attack. Security experts at FireEye discovered a new […]
FireEye discovered a new watering hole attack based on 0-day exploit
11:00 ET, 20 February 2014 Security researchers from FireEye have recently discovered a new IE 10 Zero-Day exploit being used in a watering hole attack. Security experts at FireEye discovered a new […]
MOON, the strange worm spreading on Linksys routers
10:00 ET, 19 February 2014 Security researchers at SANS detected a self-replicating malware (dubbed moon worm) is spreading among a number of different Linksys routers. Researchers at the SANS Institute discovered a new self-replicating worm […]
MOON, the strange worm spreading on Linksys routers
10:00 ET, 19 February 2014 Security researchers at SANS detected a self-replicating malware (dubbed moon worm) is spreading among a number of different Linksys routers. Researchers at the SANS Institute discovered a new self-replicating worm […]
The crowd-funding site Kickstarter has been Hacked
9:30 ET, 18 February 2014 The crowd-funding site Kickstarter has been Hacked! The company suggested to its users to change their password. The popular crowd funding website Kickstarter is the last victim […]
Unclassified NSA memorandum provides further details on Snowden case
09:00 ET, 17 February 2014 An unclassified NSA memorandum disclosed by the NBC News reveals Snowden allegedly managed to access classified documentation stealing coworker’s passwords. The hypothesis that Edward Snowden has operated […]
NIST has published cybersecurity framework for critical infrastructure
10:00 ET, 14 February 2014 US Government has published cybersecurity framework for critical infrastructure, a “living document” to improve internal security. The US Government has issued a cybersecurity framework for critical infrastructure, the goal is to improve IT […]
JackPOS malware presented as a Java Update Scheduler
13:45 ET, 13 February 2014 JackPOS was detected by security experts at IntelCrawler firm several days ago and it seemed based on code from “Alina”. Attacks on POS are on the […]
The Mask – the most sophisticated APT operation seen to date
16:00 ET, 12 February 2014 Speaking at Kaspersky Lab’s Industry Analyst Summit,Costin Raiu revealed details on The Mask campaign, the most sophisticated operation they’ve seen to date. The Kaspersky team recently […]
Snowden has leaked secret documents with a common web crawler
10:00 ET, 11 February 2014 According an internal investigation Snowden has leaked the secret NSA documents using a web crawler software designed to search, index and backup a website. The […]
Disconcerting Report on cybersecurity for US Government entities
11:00 ET, 10 February 2014 A report issued by The Federal Government’s Track Record provides a scaring picture on cybersecurity for US Government entities. The US Government is a privileged target for […]
Hackers use encryption to server a GameOver Zeus banking malware
14:00 ET, 7 February 2014 Hackers use encryption to server a GameOver Zeus banking malware Security experts at Malcovery firm have detected a new Zeus variant bypassing the security traditional […]
Syrian Electronic Army hacks into Facebook’s domain
9:30 ET, 6 February 2014 The Syrian Electronic Army claimed Wednesday that it managed to hack into Facebook violating an administrator account of the Facebook’s Domain Registrar. Syrian Electronic […]
US Intelligence warns on Counterintelligence and cyber espionage
10:00 ET, 5 February 2014 Intelligence officials now view the threat from counterintelligence, foreign spying and the leaking, as the No. 2 danger facing the country. Top U.S. Intelligence officials […]
Syrian Electronic Army hacked Ebay and Paypal websites
9:30 ET, 4 February 2014 Ebay and PayPal hacked by Syrian Electronic Army, “For denying Syrian citizens the ability to purchase online products” said SEA. The group of hackers Syrian Electronic Army (SEA) has […]
Six Perils of BYOD Data Security Exploitation
13:30 ET, 3 February 2014 By Vinod Mohan, SolarWinds Bring Your Own Device (BYOD) is not a new story in today’s IT world, and all organizations—across all sectors and geographies—are […]
Admiral Rogers chosen as new NSA director.The man of Information Warfare
9:30 ET, 3 February 2014 The Obama Administration will assign the command of NSA to Michael S. Rogers, the US Government has chosen a military Expert on Information Warfare. The […]