Monthly Archives: July 2013
New Best Practices for Detecting Malware in the 21st Century
Jul 31, 2013, 11:30 am EST By Stephen Newman, Vice President of Products, Damballa Detecting malicious network behavior isn’t as straightforward as it used to be. Organizations can no longer […]
Researcher demonstrated SmartTV hacking on Samsung models
Jul 30, 2013, 11:00 am EST The researcher Malik Mesellem demonstrated that SmartTV hacking is a real menace, Samsung models could be forced to reboot sending an HTTP GET request It is […]
Context Information Security report “Web Application Vulnerability Statistics 2013
Jul 29, 2013, 11:30 am EST Context Information Security issued the report “Web Application Vulnerability Statistics 2013” that provides statistic on Web Application Vulnerabilities based on data gathered from a […]
Vulnerability disclosed pwds of all Barracuda Network Employees
Jul 25, 2013, 11:30 am EST The cyber security Analyst @Qcert Ebrahim Hegazy(@Zigoo0) has found a Password disclosure vulnerability in one of Barracuda update servers which allows the attackers to gain access […]
Who has hacked the Apple iOS Developer Center?
Jul 24, 2013, 11:30 am EST After a weekend of outage and various mysterious password reset emails Apple has revealed that the iOS Developer Center was hacked. After 3 days […]
Security experts uncovered an unusual cyber espionage ….
Jul 23, 2013, 01:00 pm EST Security experts uncovered an unusual cyber espionage campaign based on file infector belonging to the PE_EXPIRO family that includes information theft module Security experts […]
Hackers breach Nasdaq community forum website
Jul 22, 2013, 06:30 pm EST By Matthew Finnegan Trend Micro uncovered targeted attack against European and Asian government agencies to steal login credentials from IE and Microsoft Outlook products. Hackers […]
Korea sets out to train more cyber experts, hackers
Jul 22, 2013, 11:30 am EST By Jin Eun-soo and Choi Jung-min South Korea is taking belated-yet-necessary-steps to train more cyber security experts following a series of disruptive hacking attacks […]
Trend Micro – targeted attack against Europe-Asia government agencies
Jul 22, 2013, 11:30 am EST Trend Micro uncovered targeted attack against European and Asian government agencies to steal login credentials from IE and Microsoft Outlook products. A new targeted […]
Cyber Intelligence Europe 2013
CYBER INTELLIGENCE EUROPE 17-19 September 2013 Venue : Renaissance Marriott Brussels Hotel, Brussels, Belgium Jul 18, 2013, 04:00 pm EST EARLY BIRD OFFER EXPIRES ON THE 31st JULY 2013 – BOOK TODAY […]
Gaming platforms under attack – Nintendo and Ubisoft hacks
Jul 17, 2013, 11:00 am EST The number of attacks against gaming platforms is constantly increasing, the recent data breach occurred to Nintendo and Ubisoft are just the tip of […]
Researchers can hack Verizon Wireless femtocells to spy on customers
Jul 17, 2013, 07:00 pm EST Two security researchers announced that they have succeeded to transform Verizon mobile phones into spy tools to track Verizon’s users. The security experts revealed […]
Oil & Natural Gas Cyber Security – CYpBER 2013
When: 20 November, 2013 Where: Nicosia, Cyprus Don’t miss the Oil & Natural Gas Cyber Security – CYpBER 2013 – Nicosia, Cyprus. Cyber-attacks in Oil and Natural Gas trade, will have major […]
Cybercriminals Leveraging Facebook is the title of a research
Jul 15, 2013, 11:30 am EST Cybercriminals Leveraging Facebook is the title of a research that provided evidence that criminal organizations are exploiting Facebook for illegal activities. Cybercriminals Leveraging Facebook, this […]
Are You Inviting Hackers into Your Network?
by Peter Martini, COO iboss Security It no longer requires high tech tools to hijack an imperiled network. Are you using a traditional MDM solution? You could be leaving the […]
Hackers hit South Korea also spread spyware to steal military secrets
Jul 11, 2013, 11:00 am EST Mac Afee Lab experts revealed that hackers behind large scale cyber-attacks against South Korea also designed malware to steal military secrets. The hackers behind […]
The cybercrime ecosystem, resources,motivations and methods
Jul 10, 2013, 11:00 am EST Information provided by the results of principal researches on the cybercrime reveals resources,motivations and methods and cost illegal operations. Fortinet has published early 2013 […]
Android Hack-Tool discovered by F-Secure
Jul 9, 2013, 11:30 am EST Android Hack-Tool discovered by F-Secure confirming that cyber threats targeting Android devices are rapidly growing in quantity and sophistication level. F-Secure have recently announced […]
Best Practices for Keeping Assets Safe In Virtualized Data Centers
Jul 8, 2013, 05:00 pm EST Virtualization has redefined the data center and, in so doing, created a new approach to network architecture. An environment that converts servers into files, […]
DropBox account hacking bypassing two-factor authentication
Jul 8, 2013, 11:30 am EST Zouheir Abdallah revealed that a hacker already knows the victim’s credentials for Dropbox account that has 2FA authentication enabled, is able to hack it. […]
Self-propagating ZeuS source code offered for sale
By Pierluigi Paganini, Editor-in-Chief, CDM Jul 5, 2013, 11:30 am EST A new variant of Zeus Trojan is offered for sale in the underground. It is a Self-propagating version that […]
Android botnets on the rise
By Pierluigi Paganini, Editor-in-Chief, CDM Jul 3, 2013, 11:00 am EST Principal Security experts are confident that in the next months we will assist to the explosion for Android botnets […]
SIM Card Forensics
Jul 02, 2013, 04:30 pm EST There are a number of reasons that make SIM card forensics an interesting topic; here are a few of them: Popularity: almost everyone has a […]
Stellar Wind, Prism,EvilOlive,ShellTrumpet, US massive surveillance
By Pierluigi Paganini, Editor-in-Chief, CDM Jul 2, 2013, 11:00 am EST Stellar Wind, Prism,EvilOlive, ShellTrumpet are the names of some of the US massive surveillance programs revealed recently by the […]
Two-factor Authentication for SMBs
By Pierluigi Paganini, Editor-in-Chief, CDM Jul 1, 2013, 11:30 am EST Two-factor Authentication for SMBs The purpose of this article is to cover the challenges SMBs are facing when it […]