Monthly Archives: September 2014
iFrame based redirection attacks used to monitor Chinese organizations
Security Experts at FireEye discovered a new malicious campaign which is targeting Chinese organizations with iFrame traffic redirection to serve RAT. Security experts at FireEye observed a new malicious campaign that is targeting non-profit […]
FBI concerned about encrypion by default for Smartphones
FBI Director James Comey said that he was “very concerned” about decision on Apple and Google to implement data encryption by default on their Smartphones. The FBI is concerned about […]
Bash Bug is a critical risk to entire Internet infrastructure
Bash Bug is a critical flaw remotely Exploitable which affects Linux, Unix and Apple Mac OS X and that is threatening the global Internet infrastructure. A new critical vulnerability dubbed Bash Bug in […]
Jimmy John’s has confirmed breach of POS systems at 216 stores
In a statement issued by Jimmy John’s the company confirmed a data breach to its point-of-sale systems at 216 locations in the US. The US sandwich chain Jimmy John’s has confirmed a […]
IT giants Google and Apple enable encryption by default
Google has announced that its new Android L will encrypt users’ data by default, the rise of the User Controlled Encryption paradigm. Google decided to make a further step to […]
Schneider ClearSCADA platform affected by different security flaws
ICS-CERT issued a security advisory for the existence of vulnerabilities in a variety of Schneider Electric StruxureWare SCADA Expert ClearSCADA versions. According to a recent advisory issued by the ICS-CERT […]
Fake Ad Claims You Can Charge iPhone 6 in the Microwave. Don’t Charge iPhone 6 in the Microwave.
Readers, a friendly heads up: No matter what you see or hear on the Internet, don’t cook your iPhone in the microwave. Pranksters associated with the notorious message board […]
Home Depot confirms data theft for 56 million cards
Home Depot announced that data related to 56 million cards were stolen by cyber criminals. Home Depot, the US largest home improvement retailer, confirms breach impacted 56 million customers. On Thursday the […]
Chinese hackers hit several US contractors
A report issued by the Senate Armed Services Committee reveals alleged Chinese hackers conducted dozens of cyber attacks on US defense contractors. A study conducted by the Senate Armed Services Committee discovered […]
Citadel Trojan targets energy industry in Middle East
Experts at IBM Trusteer security firms have discovered a massively distributed Citadel trojan targets Middle Eastern Petrochemical companies. Researchers at IBM Trusteer have recently discovered targeted cyber attacks using a variant of […]
Dyre Zeus variant malware used for corporate espionage
Security experts warn Dyre malware is being used by cyber criminals for corporate espionage instead harvest banking credentials. Dyre is the name of a new variant of the immortal Zeus banking trojan worries cyber […]
Treasure Map – Fiveeyes tap into German telco networks to map end devices
Documents leaked by Snowden reveal the existence of the Treasure Map program run by FiveEyes Intelligence agencies to control the global network. Treasure Map is the name of the last program of […]
High-Risk flaws affect the NOAA Satellite System JPSS
The NOAA JPSS System is affected by thousands vulnerabilities, according to a memorandum from the Department of Commerce’s Office of the Inspector General. The Satellite systems at NOAA (National Oceanic […]
AlienVault discovered Watering Hole attacks using Scanbox for reconnaissance
Security experts at AlienVault discovered a series of watering hole attacks using the Scanbox reconnaissance Framework that is targeting several industries. Security experts at AlienVault Labs have uncovered a watering hole attack with a […]
The Chinese Government runs MitM attack on Google users
The Chinese Government is running a MITM attack on SSL encrypted traffic between Chinese China Education and Research Network and Google. Google website, like many other web services, is blocked by the […]
CERT disclosed the list of most popular vulnerable Android apps
The CERT has published the results of its test conducted on popular Android applications that fail to properly validate SSL certificates. In several posts we have discussed about the improper validation […]
Namecheap accounts compromised using the CyberVor’s archive
Hosting provider Namecheap warned its customers that hackers compromised some of its users’ accounts using the CyberVor’s archive of credentials. Hosting provider Namecheap announced that earlier this week that hackers compromised some of its users’ accounts, apparently using the […]
Bogus cellphone towers found in the US
CryptoPhone 500 security firm has found 17 bogus cellphone towers in the US with a heavily customized handset exploited for surveillance activities. Seventeen mysterious cellphone towers have been discovered in the USA, they are identical […]
Brazilian cyber criminals targeting home routers
Experts at Kaspersky spotted an interesting attack from Brazilian criminals that try to change the DNS settings of home routers by using a web-based attack. Experts at Kaspersky Lab have […]
Alleged iCloud flaw exploited in Naked celebrity hack
Investigation on celebrities naked pictures leaked online raises suspicion that hackers breached iCloud accounts exploiting a flaw in the “Find my IPhone” feature. An alleged hack of Apple’s iCloud accounts of many celebrities seems to […]
APWG Q2 2014 report, phishing is even more dangerous
The APWG Report Q2 2014 states that phishing activities continue to increase, phishers are targeting Crypto Currency, Payment Services and Retail Sites. The APWG has published its new report related to phishing […]
Oil and energy industry in Norway is under attack
According to a government agencies around 300 oil and energy companies in Norway have been targeted by one of the biggest hacking campaign. Nearly 300 oil and energy companies in Norway have […]