Yearly Archives: 2014

Manual phishing attacks are the simplest and most effective hacking technique

A study published by Google demonstrates that manual phishing attacks are the simplest and most effective method for hacking email accounts. A study recently published by Google demonstrates that so-called manual phishing attacks […]

Posted in Cyber Security News | Comments Off on Manual phishing attacks are the simplest and most effective hacking technique

Operation Onymous, the joint attack against dark markets in tor

Operation Onymous – Law enforcement and judicial agencies around the globe conducted a joint action against dark markets on Tor networks. This morning I have reported the news of the seizure […]

Posted in Cyber Security News | Comments Off on Operation Onymous, the joint attack against dark markets in tor

Apple OS X Yosemite is affected by a serious vulnerability

A Swedish security expert has discovered a serious  privilege escalation vulnerability in the last Apple operating system, the OS X Yosemite. A Sweden white-hat has found a serious security flaw in […]

Posted in Cyber Security News | Comments Off on Apple OS X Yosemite is affected by a serious vulnerability

China unveils laser defense system that could shoot down small drones in a few seconds

Chinese authorities unveil the development of a new highly accurate laser defense system that is able to shoot down small drones in a few seconds. The Chinese Government has completed […]

Posted in Cyber Security News | Comments Off on China unveils laser defense system that could shoot down small drones in a few seconds

Drupal community under attack due to a critical SQL injection flaw

A security advisory issued by Drupal assumes that every installation of the popular CMS based in the version 7.x was compromised unless patched. Earlier this month, Drupal patched a critical […]

Posted in Cyber Security News | Comments Off on Drupal community under attack due to a critical SQL injection flaw

Voxis, the platform for automating rogue credit card charges is available in the underground

A group of cybercriminals is proposing in the underground an application for automating rogue credit card charges dubbed Voxis platform. The cyber criminal ecosystem has a new tool in its […]

Posted in Cyber Security News | Comments Off on Voxis, the platform for automating rogue credit card charges is available in the underground

Hackers infiltrated a White House unclassified computer network

According to an unnamed official at the White House, hackers infiltrated an unclassified network.The Obama Administration has confirmed the incident. An embarrassing incident involved the computer systems of the Obama Administration, […]

Posted in Cyber Security News | Comments Off on Hackers infiltrated a White House unclassified computer network

Backoff infections rise up to 57 percent increase in Q3

Security firm Damballa issued the ‘State of Infections Report Q3 2014’ that highlights a 57% increase in infections of the notorious Backoff POS malware. Security experts at Damballa security firm detected a 57% increase […]

Posted in Cyber Security News | Comments Off on Backoff infections rise up to 57 percent increase in Q3

Drigo spyware exploits Google Drive in targeted attacks

Security experts at TrendMicro have discovered a cyber espionage campaign which used a malware dubbed Drigo to syphon data through Google Drive. Security experts at TrendMicro have uncovered a new […]

Posted in Cyber Security News | Comments Off on Drigo spyware exploits Google Drive in targeted attacks

Operation Distributed Dragons, thousands of machine compromised worldwide

Operation Distributed Dragons – Tiger Security firm has discovered a series of DDoS attacks from China and that appear as run by a structured organization. Security experts at the Italian […]

Posted in Cyber Security News | Comments Off on Operation Distributed Dragons, thousands of machine compromised worldwide

Malvertising campaigns hit US military industry to steal secrets and intellectual property

A new wave of malvertising attacks finalized to cyber espionage is targeting military contractors to military secrets and intellectual property. Security experts at security company Invincea have uncovered a new malvertising campaign […]

Posted in Cyber Security News | Comments Off on Malvertising campaigns hit US military industry to steal secrets and intellectual property

ICS-CERT states that manufacturing organization compromised for several months

Last ICS-CERT MONITOR report reveals that hackers had access to the systems of an unnamed manufacturing organization for several months. According to the ICS-CERT MONITOR report, which summarizes the Industrial Control […]

Posted in Cyber Security News | Comments Off on ICS-CERT states that manufacturing organization compromised for several months

WAAR report – Web Attacks continue to increase, especially those launched from Amazon servers

Cloud computing is considered an amazing opportunity for cybercrime, from the perspective of an attacher these powerful architectures have the necessary resources to conduct powerful attacks, and consider also that often the data […]

Posted in Cyber Security News | Comments Off on WAAR report – Web Attacks continue to increase, especially those launched from Amazon servers

Leaked programming manual inspired development malware for ATMs

A document on NCR ATM API Documentation disclosed on Baidu may have helped criminals to develop malware used in the recent attacks against ATMs worldwide. Recently Kaspersky Lab spotted a […]

Posted in Cyber Security News | Comments Off on Leaked programming manual inspired development malware for ATMs

Criminal gangs use Tyupkin malware to steal millions from ATMs

Criminal gangs have stolen millions of dollars from ATMs worldwide using the Tyupkin malware which forces machines to dispense cash. Criminal gangs in Eastern Europe are increasing the number of attacks […]

Posted in Cyber Security News | Comments Off on Criminal gangs use Tyupkin malware to steal millions from ATMs

ATM hacking easily with RM100 chip and a free malware

Cybercrime expert explains anyone with technical knowledge, a malware and the help of an insider could easily hack an ATM machine. A RM100 chip, specific technical knowledge and a free malware […]

Posted in Cyber Security News | Comments Off on ATM hacking easily with RM100 chip and a free malware

Bash bug and risks posed by incomplete patches, discovered other two additional bugs

The security researcher Michal Zalewski revealed the details of other two additional bugs he discovered in the Bourne Again Shell after the Bash Bug case. IT community worldwide has been […]

Posted in Cyber Security News | Comments Off on Bash bug and risks posed by incomplete patches, discovered other two additional bugs

FBI identified hackers which stolen intellectual property of Xbox One

A group of hackers was identified by the FBI while trying to sale a mockup of the XBox One for $5,000. A group of men was accused of running a hacking campaign […]

Posted in Cyber Security News | Comments Off on FBI identified hackers which stolen intellectual property of Xbox One

Apple released a patch for the Shellshock vulnerability

Apple has just released its patch for the Shellshock vulnerability. The company provided an update for the OS X Lion, Mountain Lion and Mavericks. A few days ago the Internet […]

Posted in Cyber Security News | Comments Off on Apple released a patch for the Shellshock vulnerability

The Top Ten Mobile Flashlight Applications Are Spying On You. Did You Know?

SnoopWall CEO, Gary Miliefsky, a Founding Member of Department of Homeland Security, Recommends that Everyone with a Mobile Device Should Immediately Delete their Mobile Flashlight Apps by Gary S. Miliefsky, […]

Posted in Cyber Security News | Comments Off on The Top Ten Mobile Flashlight Applications Are Spying On You. Did You Know?

iFrame based redirection attacks used to monitor Chinese organizations

Security Experts at FireEye discovered a new malicious campaign which is targeting Chinese organizations with iFrame traffic redirection to serve RAT. Security experts at FireEye observed a new malicious campaign that is targeting non-profit […]

Posted in Cyber Security News | Comments Off on iFrame based redirection attacks used to monitor Chinese organizations

FBI concerned about encrypion by default for Smartphones

FBI Director James Comey said that he was “very concerned” about decision on Apple and Google to implement data encryption by default on their Smartphones. The FBI is concerned about […]

Posted in Cyber Security News | Comments Off on FBI concerned about encrypion by default for Smartphones

Bash Bug is a critical risk to entire Internet infrastructure

Bash Bug is a critical flaw  remotely Exploitable which affects Linux, Unix and Apple Mac OS X and that is threatening the global Internet infrastructure. A new critical vulnerability dubbed Bash Bug in […]

Posted in Cyber Security News | Comments Off on Bash Bug is a critical risk to entire Internet infrastructure

Jimmy John’s has confirmed breach of POS systems at 216 stores

In a statement issued by Jimmy John’s the company confirmed a data breach to its point-of-sale systems at 216 locations in the US. The US sandwich chain Jimmy John’s has confirmed a […]

Posted in Cyber Security News | Comments Off on Jimmy John’s has confirmed breach of POS systems at 216 stores

IT giants Google and Apple enable encryption by default

Google has announced that its new Android L will encrypt users’ data by default, the rise of the User Controlled Encryption paradigm. Google decided to make a further step to […]

Posted in Cyber Security News | Comments Off on IT giants Google and Apple enable encryption by default

Schneider ClearSCADA platform affected by different security flaws

ICS-CERT issued a security advisory for the existence of vulnerabilities in a variety of Schneider Electric StruxureWare SCADA Expert ClearSCADA versions. According to a recent advisory issued by the ICS-CERT […]

Posted in Cyber Security News | Comments Off on Schneider ClearSCADA platform affected by different security flaws

Fake Ad Claims You Can Charge iPhone 6 in the Microwave. Don’t Charge iPhone 6 in the Microwave.

  Readers, a friendly heads up: No matter what you see or hear on the Internet, don’t cook your iPhone in the microwave. Pranksters associated with the notorious message board […]

Posted in Cyber Security News | Comments Off on Fake Ad Claims You Can Charge iPhone 6 in the Microwave. Don’t Charge iPhone 6 in the Microwave.

Home Depot confirms data theft for 56 million cards

Home Depot announced that data related to 56 million cards were stolen by cyber criminals. Home Depot, the US largest home improvement retailer, confirms breach impacted 56 million customers. On Thursday the […]

Posted in Cyber Security News | Comments Off on Home Depot confirms data theft for 56 million cards

Chinese hackers hit several US contractors

A report issued by the Senate Armed Services Committee reveals alleged Chinese hackers conducted dozens of cyber attacks on US defense contractors. A study conducted by the Senate Armed Services Committee discovered […]

Posted in Cyber Security News | Comments Off on Chinese hackers hit several US contractors

Citadel Trojan targets energy industry in Middle East

Experts at IBM Trusteer security firms have discovered a massively distributed Citadel trojan targets Middle Eastern Petrochemical companies. Researchers at IBM Trusteer have recently discovered targeted cyber attacks using a variant of […]

Posted in Cyber Security News | Comments Off on Citadel Trojan targets energy industry in Middle East

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X