Monthly Archives: January 2015

Regin and Qwerty keylogger are linked with Five Eyes Intelligence

Experts at Kaspersky Lab compared the Regin module 50251 and the “Qwerty” keylogger discovering that they share…

Java poses the biggest security risks to PCs in US

According to a new series of reports published by Secunia firm, Oracle Java poses the biggest security…

Reading the ENISA Threat Landscape 2014 report

The European Union Agency for Network and Information Security has published the annual report on the cyber…

AT&T short codes exposes users to phishing scams

Computer programmer Dani Grant revealed that texts messages from AT&T are easy to spoof and expose customers…

5800 Gas Station Tank Gauges vulnerable to cyber attacks

Rapid7 revealed that more than 5000 Automated tank gauges (ATGs) used to prevent fuel leaks at gas…

Car hacking – Progressive Dongle exposes vehicles to attacks

A security researcher demonstrated that “car hacking” is reality through the exploitation of vulnerable Can Insurance Dongle….

Snowden reveals that China stole plans for a new F-35 aircraft fighter

Snowden’s documents reveal China stole designs for the US-built F-35 Fighter jet, and provides details also a…

Chinese Government runs a MITM attack against Microsoft Outlook

GreatFire revealed that the popular Microsoft Outlook emailing service was subjected to a man-in-the-middle (MITM) attack in…

USA and UK announce joint cyber ‘war games’ to improve cyber defenses

The United States and the U.K. announced that they will stage joint cyber “war games” to boost…

Anonymous supports FBI in the investigation of the US CENTCOM hack

FBI seems to consider seriously the list of IP addresses involved in the hack of US CENTCOM…

Show Buttons
Hide Buttons