Yearly Archives: 2014
Manual phishing attacks are the simplest and most effective hacking technique
A study published by Google demonstrates that manual phishing attacks are the simplest and most effective method for hacking email accounts. A study recently published by Google demonstrates that so-called manual phishing attacks […]
Operation Onymous, the joint attack against dark markets in tor
Operation Onymous – Law enforcement and judicial agencies around the globe conducted a joint action against dark markets on Tor networks. This morning I have reported the news of the seizure […]
Apple OS X Yosemite is affected by a serious vulnerability
A Swedish security expert has discovered a serious privilege escalation vulnerability in the last Apple operating system, the OS X Yosemite. A Sweden white-hat has found a serious security flaw in […]
China unveils laser defense system that could shoot down small drones in a few seconds
Chinese authorities unveil the development of a new highly accurate laser defense system that is able to shoot down small drones in a few seconds. The Chinese Government has completed […]
Drupal community under attack due to a critical SQL injection flaw
A security advisory issued by Drupal assumes that every installation of the popular CMS based in the version 7.x was compromised unless patched. Earlier this month, Drupal patched a critical […]
Voxis, the platform for automating rogue credit card charges is available in the underground
A group of cybercriminals is proposing in the underground an application for automating rogue credit card charges dubbed Voxis platform. The cyber criminal ecosystem has a new tool in its […]
Hackers infiltrated a White House unclassified computer network
According to an unnamed official at the White House, hackers infiltrated an unclassified network.The Obama Administration has confirmed the incident. An embarrassing incident involved the computer systems of the Obama Administration, […]
Backoff infections rise up to 57 percent increase in Q3
Security firm Damballa issued the ‘State of Infections Report Q3 2014’ that highlights a 57% increase in infections of the notorious Backoff POS malware. Security experts at Damballa security firm detected a 57% increase […]
Drigo spyware exploits Google Drive in targeted attacks
Security experts at TrendMicro have discovered a cyber espionage campaign which used a malware dubbed Drigo to syphon data through Google Drive. Security experts at TrendMicro have uncovered a new […]
Operation Distributed Dragons, thousands of machine compromised worldwide
Operation Distributed Dragons – Tiger Security firm has discovered a series of DDoS attacks from China and that appear as run by a structured organization. Security experts at the Italian […]
Malvertising campaigns hit US military industry to steal secrets and intellectual property
A new wave of malvertising attacks finalized to cyber espionage is targeting military contractors to military secrets and intellectual property. Security experts at security company Invincea have uncovered a new malvertising campaign […]
ICS-CERT states that manufacturing organization compromised for several months
Last ICS-CERT MONITOR report reveals that hackers had access to the systems of an unnamed manufacturing organization for several months. According to the ICS-CERT MONITOR report, which summarizes the Industrial Control […]
WAAR report – Web Attacks continue to increase, especially those launched from Amazon servers
Cloud computing is considered an amazing opportunity for cybercrime, from the perspective of an attacher these powerful architectures have the necessary resources to conduct powerful attacks, and consider also that often the data […]
Leaked programming manual inspired development malware for ATMs
A document on NCR ATM API Documentation disclosed on Baidu may have helped criminals to develop malware used in the recent attacks against ATMs worldwide. Recently Kaspersky Lab spotted a […]
Criminal gangs use Tyupkin malware to steal millions from ATMs
Criminal gangs have stolen millions of dollars from ATMs worldwide using the Tyupkin malware which forces machines to dispense cash. Criminal gangs in Eastern Europe are increasing the number of attacks […]
ATM hacking easily with RM100 chip and a free malware
Cybercrime expert explains anyone with technical knowledge, a malware and the help of an insider could easily hack an ATM machine. A RM100 chip, specific technical knowledge and a free malware […]
Bash bug and risks posed by incomplete patches, discovered other two additional bugs
The security researcher Michal Zalewski revealed the details of other two additional bugs he discovered in the Bourne Again Shell after the Bash Bug case. IT community worldwide has been […]
FBI identified hackers which stolen intellectual property of Xbox One
A group of hackers was identified by the FBI while trying to sale a mockup of the XBox One for $5,000. A group of men was accused of running a hacking campaign […]
Apple released a patch for the Shellshock vulnerability
Apple has just released its patch for the Shellshock vulnerability. The company provided an update for the OS X Lion, Mountain Lion and Mavericks. A few days ago the Internet […]
The Top Ten Mobile Flashlight Applications Are Spying On You. Did You Know?
SnoopWall CEO, Gary Miliefsky, a Founding Member of Department of Homeland Security, Recommends that Everyone with a Mobile Device Should Immediately Delete their Mobile Flashlight Apps by Gary S. Miliefsky, […]
iFrame based redirection attacks used to monitor Chinese organizations
Security Experts at FireEye discovered a new malicious campaign which is targeting Chinese organizations with iFrame traffic redirection to serve RAT. Security experts at FireEye observed a new malicious campaign that is targeting non-profit […]
FBI concerned about encrypion by default for Smartphones
FBI Director James Comey said that he was “very concerned” about decision on Apple and Google to implement data encryption by default on their Smartphones. The FBI is concerned about […]
Bash Bug is a critical risk to entire Internet infrastructure
Bash Bug is a critical flaw remotely Exploitable which affects Linux, Unix and Apple Mac OS X and that is threatening the global Internet infrastructure. A new critical vulnerability dubbed Bash Bug in […]
Jimmy John’s has confirmed breach of POS systems at 216 stores
In a statement issued by Jimmy John’s the company confirmed a data breach to its point-of-sale systems at 216 locations in the US. The US sandwich chain Jimmy John’s has confirmed a […]
IT giants Google and Apple enable encryption by default
Google has announced that its new Android L will encrypt users’ data by default, the rise of the User Controlled Encryption paradigm. Google decided to make a further step to […]
Schneider ClearSCADA platform affected by different security flaws
ICS-CERT issued a security advisory for the existence of vulnerabilities in a variety of Schneider Electric StruxureWare SCADA Expert ClearSCADA versions. According to a recent advisory issued by the ICS-CERT […]
Fake Ad Claims You Can Charge iPhone 6 in the Microwave. Don’t Charge iPhone 6 in the Microwave.
Readers, a friendly heads up: No matter what you see or hear on the Internet, don’t cook your iPhone in the microwave. Pranksters associated with the notorious message board […]
Home Depot confirms data theft for 56 million cards
Home Depot announced that data related to 56 million cards were stolen by cyber criminals. Home Depot, the US largest home improvement retailer, confirms breach impacted 56 million customers. On Thursday the […]
Chinese hackers hit several US contractors
A report issued by the Senate Armed Services Committee reveals alleged Chinese hackers conducted dozens of cyber attacks on US defense contractors. A study conducted by the Senate Armed Services Committee discovered […]
Citadel Trojan targets energy industry in Middle East
Experts at IBM Trusteer security firms have discovered a massively distributed Citadel trojan targets Middle Eastern Petrochemical companies. Researchers at IBM Trusteer have recently discovered targeted cyber attacks using a variant of […]