Monthly Archives: October 2014
Hackers infiltrated a White House unclassified computer network
According to an unnamed official at the White House, hackers infiltrated an unclassified network.The Obama Administration has confirmed the incident. An embarrassing incident involved the computer systems of the Obama Administration, […]
Backoff infections rise up to 57 percent increase in Q3
Security firm Damballa issued the ‘State of Infections Report Q3 2014’ that highlights a 57% increase in infections of the notorious Backoff POS malware. Security experts at Damballa security firm detected a 57% increase […]
Drigo spyware exploits Google Drive in targeted attacks
Security experts at TrendMicro have discovered a cyber espionage campaign which used a malware dubbed Drigo to syphon data through Google Drive. Security experts at TrendMicro have uncovered a new […]
Operation Distributed Dragons, thousands of machine compromised worldwide
Operation Distributed Dragons – Tiger Security firm has discovered a series of DDoS attacks from China and that appear as run by a structured organization. Security experts at the Italian […]
Malvertising campaigns hit US military industry to steal secrets and intellectual property
A new wave of malvertising attacks finalized to cyber espionage is targeting military contractors to military secrets and intellectual property. Security experts at security company Invincea have uncovered a new malvertising campaign […]
ICS-CERT states that manufacturing organization compromised for several months
Last ICS-CERT MONITOR report reveals that hackers had access to the systems of an unnamed manufacturing organization for several months. According to the ICS-CERT MONITOR report, which summarizes the Industrial Control […]
WAAR report – Web Attacks continue to increase, especially those launched from Amazon servers
Cloud computing is considered an amazing opportunity for cybercrime, from the perspective of an attacher these powerful architectures have the necessary resources to conduct powerful attacks, and consider also that often the data […]
Leaked programming manual inspired development malware for ATMs
A document on NCR ATM API Documentation disclosed on Baidu may have helped criminals to develop malware used in the recent attacks against ATMs worldwide. Recently Kaspersky Lab spotted a […]
Criminal gangs use Tyupkin malware to steal millions from ATMs
Criminal gangs have stolen millions of dollars from ATMs worldwide using the Tyupkin malware which forces machines to dispense cash. Criminal gangs in Eastern Europe are increasing the number of attacks […]
ATM hacking easily with RM100 chip and a free malware
Cybercrime expert explains anyone with technical knowledge, a malware and the help of an insider could easily hack an ATM machine. A RM100 chip, specific technical knowledge and a free malware […]
Bash bug and risks posed by incomplete patches, discovered other two additional bugs
The security researcher Michal Zalewski revealed the details of other two additional bugs he discovered in the Bourne Again Shell after the Bash Bug case. IT community worldwide has been […]
FBI identified hackers which stolen intellectual property of Xbox One
A group of hackers was identified by the FBI while trying to sale a mockup of the XBox One for $5,000. A group of men was accused of running a hacking campaign […]
Apple released a patch for the Shellshock vulnerability
Apple has just released its patch for the Shellshock vulnerability. The company provided an update for the OS X Lion, Mountain Lion and Mavericks. A few days ago the Internet […]
The Top Ten Mobile Flashlight Applications Are Spying On You. Did You Know?
SnoopWall CEO, Gary Miliefsky, a Founding Member of Department of Homeland Security, Recommends that Everyone with a Mobile Device Should Immediately Delete their Mobile Flashlight Apps by Gary S. Miliefsky, […]