Monthly Archives: March 2015

The Installer Hijacking vulnerability exposes 1 of 2 Android users to attack

Experts at Palo Alto Networks discovered the Installer Hijacking vulnerability that exposes half of Android users to…

Chinese CA issued bogus digital certificates for Google domains

Google security team has recently discovered and blocked fraudulent digital certificates issued for several Google domains by a Chinese CA….

Some models of Cisco IP Phones vulnerable to eavesdropping

Chris Watts discovered a security flaw affecting some models of Cisco IP Phones that could be exploited…

Operation Woolen Goldfish, a hacking campaign in the wild

Security experts at Trend Micro have uncovered a new cyber espionage campaign that is targeting a number…

Boeing announced its hack-proof drone

Boeing announced its project for the production of an unhackable drone, dubbed Boeing Little Bird, which should…

Cardless ATMs will improve security of cash withdrawal

A unit of Canada’s Bank of Montreal will launch on Monday its network of cardless ATMs, a…

Yahoo launches its on-demand password feature

Yahoo announced its new on-demand password feature that lets users into login in their account with a…

ICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

17 March 2015 DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations…

EquationDrug, the hacking platform of the Equation Group APT

Experts at Kaspersky Lab published a detailed analysis of the EquationDrug platform and its modules developed by…

Apple and Microsoft released updates to fix the FREAK flaw

Microsoft and Apple released security updates to fix the FREAK vulnerability recently discovered and affecting their products….

Show Buttons
Hide Buttons