Monthly Archives: September 2014

iFrame based redirection attacks used to monitor Chinese organizations

Security Experts at FireEye discovered a new malicious campaign which is targeting Chinese organizations with iFrame traffic redirection to serve RAT. Security experts at FireEye observed a new malicious campaign that is targeting non-profit […]

Posted in Cyber Security News | Comments Off on iFrame based redirection attacks used to monitor Chinese organizations

FBI concerned about encrypion by default for Smartphones

FBI Director James Comey said that he was “very concerned” about decision on Apple and Google to implement data encryption by default on their Smartphones. The FBI is concerned about […]

Posted in Cyber Security News | Comments Off on FBI concerned about encrypion by default for Smartphones

Bash Bug is a critical risk to entire Internet infrastructure

Bash Bug is a critical flaw  remotely Exploitable which affects Linux, Unix and Apple Mac OS X and that is threatening the global Internet infrastructure. A new critical vulnerability dubbed Bash Bug in […]

Posted in Cyber Security News | Comments Off on Bash Bug is a critical risk to entire Internet infrastructure

Jimmy John’s has confirmed breach of POS systems at 216 stores

In a statement issued by Jimmy John’s the company confirmed a data breach to its point-of-sale systems at 216 locations in the US. The US sandwich chain Jimmy John’s has confirmed a […]

Posted in Cyber Security News | Comments Off on Jimmy John’s has confirmed breach of POS systems at 216 stores

IT giants Google and Apple enable encryption by default

Google has announced that its new Android L will encrypt users’ data by default, the rise of the User Controlled Encryption paradigm. Google decided to make a further step to […]

Posted in Cyber Security News | Comments Off on IT giants Google and Apple enable encryption by default

Schneider ClearSCADA platform affected by different security flaws

ICS-CERT issued a security advisory for the existence of vulnerabilities in a variety of Schneider Electric StruxureWare SCADA Expert ClearSCADA versions. According to a recent advisory issued by the ICS-CERT […]

Posted in Cyber Security News | Comments Off on Schneider ClearSCADA platform affected by different security flaws

Fake Ad Claims You Can Charge iPhone 6 in the Microwave. Don’t Charge iPhone 6 in the Microwave.

  Readers, a friendly heads up: No matter what you see or hear on the Internet, don’t cook your iPhone in the microwave. Pranksters associated with the notorious message board […]

Posted in Cyber Security News | Comments Off on Fake Ad Claims You Can Charge iPhone 6 in the Microwave. Don’t Charge iPhone 6 in the Microwave.

Home Depot confirms data theft for 56 million cards

Home Depot announced that data related to 56 million cards were stolen by cyber criminals. Home Depot, the US largest home improvement retailer, confirms breach impacted 56 million customers. On Thursday the […]

Posted in Cyber Security News | Comments Off on Home Depot confirms data theft for 56 million cards

Chinese hackers hit several US contractors

A report issued by the Senate Armed Services Committee reveals alleged Chinese hackers conducted dozens of cyber attacks on US defense contractors. A study conducted by the Senate Armed Services Committee discovered […]

Posted in Cyber Security News | Comments Off on Chinese hackers hit several US contractors

Citadel Trojan targets energy industry in Middle East

Experts at IBM Trusteer security firms have discovered a massively distributed Citadel trojan targets Middle Eastern Petrochemical companies. Researchers at IBM Trusteer have recently discovered targeted cyber attacks using a variant of […]

Posted in Cyber Security News | Comments Off on Citadel Trojan targets energy industry in Middle East

Dyre Zeus variant malware used for corporate espionage

Security experts warn Dyre malware is being used by cyber criminals for corporate espionage instead harvest banking credentials. Dyre is the name of a new variant of the immortal Zeus banking trojan worries cyber […]

Posted in Cyber Security News | Comments Off on Dyre Zeus variant malware used for corporate espionage

Treasure Map – Fiveeyes tap into German telco networks to map end devices

Documents leaked by Snowden reveal the existence of the Treasure Map program run by FiveEyes Intelligence agencies to control the global network. Treasure Map is the name of the last program of […]

Posted in Cyber Security News | Comments Off on Treasure Map – Fiveeyes tap into German telco networks to map end devices

High-Risk flaws affect the NOAA Satellite System JPSS

The NOAA JPSS System is affected by thousands vulnerabilities, according to a memorandum from the Department of Commerce’s Office of the Inspector General. The Satellite systems at NOAA (National Oceanic […]

Posted in Cyber Security News | Comments Off on High-Risk flaws affect the NOAA Satellite System JPSS

AlienVault discovered Watering Hole attacks using Scanbox for reconnaissance

Security experts at AlienVault discovered a series of watering hole attacks using the Scanbox reconnaissance Framework that is targeting several industries. Security experts at AlienVault Labs have uncovered a watering hole attack with a […]

Posted in Cyber Security News | Comments Off on AlienVault discovered Watering Hole attacks using Scanbox for reconnaissance

The Chinese Government runs MitM attack on Google users

The Chinese Government is running a MITM attack on SSL encrypted traffic between Chinese China Education and Research Network and Google. Google website, like many other web services, is blocked by the […]

Posted in Cyber Security News | Comments Off on The Chinese Government runs MitM attack on Google users

CERT disclosed the list of most popular vulnerable Android apps

The CERT has published the results of its test conducted on popular Android applications that fail to properly validate SSL certificates. In several posts we have discussed about the improper validation […]

Posted in Cyber Security News | Comments Off on CERT disclosed the list of most popular vulnerable Android apps

Namecheap accounts compromised using the CyberVor’s archive

Hosting provider Namecheap warned its customers that hackers compromised some of its users’ accounts using the CyberVor’s archive of credentials. Hosting provider Namecheap announced that earlier this week that hackers compromised some of its users’ accounts, apparently using the […]

Posted in Cyber Security News | Comments Off on Namecheap accounts compromised using the CyberVor’s archive

Bogus cellphone towers found in the US

CryptoPhone 500 security firm has found 17 bogus cellphone towers in the US with a heavily customized handset exploited for surveillance activities. Seventeen mysterious cellphone towers have been discovered in the USA, they are identical […]

Posted in Cyber Security News | Comments Off on Bogus cellphone towers found in the US

Brazilian cyber criminals targeting home routers

Experts at Kaspersky spotted an interesting attack from Brazilian criminals that try to change the DNS settings of home routers by using a web-based attack. Experts at Kaspersky Lab have […]

Posted in Cyber Security News | Comments Off on Brazilian cyber criminals targeting home routers

Alleged iCloud flaw exploited in Naked celebrity hack

Investigation on celebrities naked pictures leaked online raises suspicion that hackers breached iCloud accounts exploiting a flaw in the “Find my IPhone” feature. An alleged hack of Apple’s iCloud accounts of many celebrities seems to […]

Posted in Cyber Security News | Comments Off on Alleged iCloud flaw exploited in Naked celebrity hack

APWG Q2 2014 report, phishing is even more dangerous

The APWG Report Q2 2014 states that phishing activities continue to increase, phishers are targeting Crypto Currency, Payment Services and Retail Sites. The APWG has published its new report related to phishing […]

Posted in Cyber Security News | Comments Off on APWG Q2 2014 report, phishing is even more dangerous

Oil and energy industry in Norway is under attack

According to a government agencies around 300 oil and energy companies in Norway have been targeted by one of the biggest hacking campaign. Nearly 300 oil and energy companies in Norway have […]

Posted in Cyber Security News | Comments Off on Oil and energy industry in Norway is under attack

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X