Monthly Archives: September 2013
Chinese hackers increasingly attracted to the drone technology
Sep 27, 2013, 12:00 pm EST Intelligence agencies reveal that Chinese hackers increasingly attracted to the drone technology while Chinese drone industry grows like never before! The fact that Chinese […]
No good news from ENISA Threat Landscape Mid year 2013
Sep 26, 2013, 11:00 am EST ENISA Threat Landscape Mid year 2013 presents top cyber threats, anticipating its interim Threat Landscape 2013 report. The study reveals concerning trends. ENISA published a […]
Chaos Computer Club claims to have defeated Apple TouchID
Sep 25, 2013, 11:30 am EST Chaos Computer Club claims to have bypassed the biometric security technology Apple TouchID by making a copy of a fingerprint photographed on a glass surface. […]
FireEye revealed APT Operation Deputy Dog against Japanese entities
Sep 24, 2013, 12:00 pm EST Security experts at FireEye discovered the Operation DeputyDog against Japanese entities that exploits Zero-Day (CVE-2013-3893) recently announced by Microsoft. FireEye announced the discovery of the cyberespionage Operation DeputyDog leveraging […]
NSA tried to insert backdoor into Linux
Sep 23, 2013, 11:45 am EST Linux Torvalds during last LinixCon admitted to have received pressure from US Intelligence to insert a backdoor into Linux. Linux Torvalds during a question-and-answer session […]
12th ANNUAL ANTI-MONEY LAUNDERING AND FINANCIAL CRIMES CONFERENCE
Largest Conference for Financial Crime Detection and Prevention Professionals Debuts Virtual Attendance Option TO ADDRESS GLOBAL FINANCIAL CRIME RISKS Miami, FL — September 18, 2013 – The Association of Certified […]
Microsoft confirmed existence of a new IE zero
Sep 19, 2013, 11:30 am EST Microsoft announced to be aware of a new IE Zero Day vulnerability (CVE-2013-3893) that affects Windows browsers IE 8 and IE 9 recently targeted […]
CBMEN, DARPA’s peer-to-peer technology for battlefield
Sep 18, 2013, 12:45 pm EST DARPA is conducting a program codenamed CBMEN (Content-Based Mobile Edge Networking) for sharing of reconnaissance and Intelligence data on battlefield through P2P technology. DARPA […]
Belgacom hack, state-sponsored attack hypothesis
Sep 17, 2013, 11:30 am EST Belgacom hack, the telecommunications company found evidence of digital intrusion in the company systems, many experts believe in a state-sponsored attack. Belgacom hack, the largest telecommunications […]
Kaspersky reveals Kimsuky operation that is targeting South Korea.
Sep 16, 2013, 11:00 am EST After months of investigation security researchers from Kaspersky have detected a new cyber espionage campaign dubbed Kimsuky that targeted South Korean organizations. Kaspersky experts […]
A look to Android offer in the underground mobile market
Sep 13, 2013, 03:30 pm EST Security experts continue to observe the evolution of the offer of services and malicious software for fraudsters in the Android underground mobile market. In the last […]
Mevade botnet responsible for the spike in Tor traffic
Sep 12, 2013, 11:30 am EST Security researchers at Fox-IT firm found evidence that the spike in Tor traffic is caused by a Mevade botnet that hides its C&C in the anonymizing network. Is the Mevade malware the […]
Hesperbot, the new powerful banking Trojan found by ESET
Sep 11, 2013, 11:30 am EST Hesperbot is the name of a new banking Trojan detected by ESET, it is a very potent malware which includes some very advanced tricks. Hesperbot is the name of the […]
Surveillance – NSA can access data on your mobile device
Sep 10, 2013, 11:30 am EST The German news agency Der Spiegel reported last act of US surveillance, the NSA is able to access data stored in a wide range of mobile devices including […]
NetTraveler APT hackers still active improved their attacks
Sep 9, 2013, 11:30 am EST Experts at Kaspersky firm provided evidences that the hackers behind cyber espionage campaign NetTraveler are still active and improved their attack methods. Last June Kaspersky firm […]
Traffic Correlation Attacks against Anonymity on Tor
Sep 6, 2013, 11:30 am EST The researchers led by Aaron Johnson of the Naval Research Laboratory published the paper on Traffic Correlation Attacks against Anonymity on Tor. Anonymity on Tor […]
Why SQL injection is the cybercriminals weapon of choice
Sep 4, 2013, 03:00 pm EST By Michael Sabo, VP of Marketing, DB Networks Fifteen years on, organizations still struggle with the SQL injection threat. There’s a sinking feeling you get […]
A False Lens of Security
Sep 4, 2013, 02:30 pm EST By Nicole Vincent Fleming Thinking of buying an IP camera to keep an eye on your home or business when you’re away? Or maybe you‘ve […]
Reversing Dropbox client code raises security issues
Sep 4, 2013, 11:30 am EST Researchers at last USENIX security symposium presented a new method and consolidated techniques for reversing Dropbox code to bypass Dropbox’s two factor authentication, hijack […]
PRISM repercussion on the Tor network accesses
Sep 3, 2013, 11:30 am EST The article proposes the analysis of the impact on the use of the Tor network after the events related to PRISM surveillance program disclosure. […]
Cybercrime abuses Facebook paid advertisements
Sep 2, 2013, 11:00 am EST A reading of an interesting study on the criminal abuse of Facebook’s Paid “Sponsor Ads” system to deliver nefarious websites to the users. In […]