Monthly Archives: May 2014
Nice Recording eXpress lawful intercept solution is flawed
Researchers at SEC Consult Vulnerability Lab discovered that Nice Recording eXpress lawful intercept software contains numerous flaws, including a backdoor. Nice Recording eXpress voice-recording package software used by law enforcement to intercept communications of suspects […]
Spotify Android app hacked, change password and Upgrade it
Spotify company is investigating unauthorized access to its systems and internal company data. Android users urge to update the app and change the password. The popular Music streaming service Spotify is the last […]
Unrecom phishing campaign hit high-profile entities globally
Security Experts at Fidelis Cyber Security firm have recently discovered a new phishing campaign using the Unrecom RAT (remote access trojan). Fidelis Cyber Security firm has recently issued the Fidelis Threat Advisory […]
Nemanja, a botnet of thousand POSs, Grocery Management and Accounting Systems
Experts at Intelligence firm IntelCrawler have detected a new botnet dubbed Nemanja composed by compromised POS terminals, accounting systems and grocery management platforms. On March 2014 experts at IntelCrawler have identified Nemanja, one of […]
FBI is officially looking for malware development
The FBI (Federal Bureau of Investigation) has issued a solicitation for malware development confirming the use of malicious code for investigation. The proliferation of malware in the cyber space is […]
Remote code injection in Microsoft, Yahoo and Orange subdomains
Security researcher Ebrahim Hegazy has identified a remote code injection vulnerability affecting several subdomains of Microsoft, Yahoo, Orange and others. Fortunately, the security Vulnerability has been fixed. While participating in […]
Al-Qaeda is developing new Encryption tools in response to NSA surveillance
Recorded Future published a report to show that members of Al-Qaeda are developing a series of new encryption software in response to NSA surveillance. The revelation based on the document leaked by Edward […]
Hackers have stolen files on Ukraine crisis from Belgian Foreign Ministry
Unknown hackers have stolen files on the Ukraine crisis from the Belgian Foreign Ministry, causing the crackdown of targeted servers. A new cyber espionage campaign hit the Belgian foreign ministry, unknown hackers have stolen […]
Federal Trade Commission – Watch out to Health and Fitness Apps
The Federal Trade Commission debated on the privacy ramifications of consumer generated and controlled health data, following data on mobile apps. The Federal Trade Commission has recently released the disconcerting […]
Heartbleed one month later, at least 300k servers are still vulnerable
Security researcher Robert Graham published the results of recent global scan searching for Heartbleed vulnerable systems. 300k systems are still vulnerable Heartbleed flaw is a bug disclosed more than a month ago, which affected OpenSSL library […]
Navy sysadmin went on hacking spree at sea
A gang of hackers that included a service member on a nuclear aircraft carrier breached the Pentagon’s National Geospatial Intelligence Agency, the biometric Transportation Worker Identification System at the Homeland […]
Orange hacked for the second time in the year, 1,3M records exposed
French telecom giant Orange has suffered the second data breach of the year on April 18th. Hackers violated its website stealing 1,3 customer records. Orange company was hit again by hackers, […]
RedSocks, An interesting vision on Malware trend in Q1
Dutch malware detection company RedSocks has issued its first Malware Trend Report related to the malicious code trends observed in the first quarter of 2014. RedSocks, a Dutch malware detection company which […]
Be aware, Apple iOS Data protection doesn’t protect email attachments
Security Researcher Andreas Kurtz noticed that email attachments within different iOS versions are not protected by Apple’s data protection mechanisms. Mobile platform security is becoming even more crucial due to the large number of applications daily […]
Skype stores all application data in a local database in plain text
Romanian Researcher discovered that Skype application store sensitive User Data Unencrypted on a local database. A Romanian programmer at Hackyard Security Group, Dragoş Gaftoneanu, revealed through a blog post that the popular VOIP application Skype leaves its local database unencrypted. […]
AOL suffered a massive Data Breach
AOL Inc. confirms security breach, email accounts of a significant number users may have been exposed, no financial data has been stolen. AOL Inc. last Monday has confirmed with an official blog post that the company suffered a […]