Monthly Archives: October 2013

Syrian Electronic Army hacked President Obama website and social media

Syrian Electronic Army hacked President Obama website and social media. Syrian Electronic Army Targeted President Obama’s website, Twitter and Facebook accounts and email account linked to his non-profit activities. Once […]

Posted in Cyber Security News | Comments Off on Syrian Electronic Army hacked President Obama website and social media

LinkedIn Intro iOS app intercept user’s emails in iPhone and much more

LinkedIn Intro iOS app intercept user’s emails in iPhone and much more LinkedIn launched LinkedIn Intro app for iOS to show LI profiles right inside the native iPhone mail client. […]

Posted in Cyber Security News | Comments Off on LinkedIn Intro iOS app intercept user’s emails in iPhone and much more

Android Wroba banking trojan targeted Korean users

October 25, 2013 – The Antivirus vendor Malwarebytes revealed that the Wroba banking trojan distributed via file sharing sites and alternative markets targeted Korean users. Today I presented at Cyber […]

Posted in Cyber Security News | Comments Off on Android Wroba banking trojan targeted Korean users

Root access backdoor discovered in Chinese Tenda Wireless Routers

Root access backdoor discovered in Chinese Tenda Wireless Routers Craig Heffner has discovered a new backdoor in the Wireless Routers produced by China based networking device and equipment manufacturer Tenda […]

Posted in Cyber Security News | Comments Off on Root access backdoor discovered in Chinese Tenda Wireless Routers

Verizon Wireless – how a simple bug could cause a disaster

Verizon Wireless – how a simple bug could cause a disaster A researcher discovered a serious vulnerability in Verizon Wireless’s Web-based customer portal that enabled anyone to download user’s SMS […]

Posted in Cyber Security News | Comments Off on Verizon Wireless – how a simple bug could cause a disaster

A backdoor present in many D-Link devices allows to bypass authentication

A backdoor present in many D-Link devices allows to bypass authentication Researcher Craig published an interesting blog post on “/dev/ttyS0” on the reverse engineering of the backdoor present in many D-Link […]

Posted in Cyber Security News | Comments Off on A backdoor present in many D-Link devices allows to bypass authentication

Google Chrome users are vulnerable to sensitive data theft

Google Chrome users are vulnerable to sensitive data theft Security experts at Identity Finder demonstrated that Google Chrome users are vulnerable to sensitive Data Theft because the browser stores it […]

Posted in Cyber Security News | Comments Off on Google Chrome users are vulnerable to sensitive data theft

How to exploit iFramed based traffic E-shop for illegal activities

17 October 2013 16:00 EST How to exploit iFramed based traffic E-shop for illegal activities What is an E-shop for iFramed traffic and how does cybercrime exploit it? In this post thanks to […]

Posted in Cyber Security News | Comments Off on How to exploit iFramed based traffic E-shop for illegal activities

Blackhole author arrested. The impact on the underground market

Blackhole author arrested. The impact on the underground market The author of the Blackhole exploits kit has been arrested after a long investigation. What will change in the offer of […]

Posted in Cyber Security News | Comments Off on Blackhole author arrested. The impact on the underground market

2013 Norton Report, the impact of cybercrime according Symantec

2013 Norton Report, the impact of cybercrime according Symantec Symantec issued 2013 Norton Report, the annual research study which examines the consumers’ online behaviors, the dangers and financial cost of […]

Posted in Cyber Security News | Comments Off on 2013 Norton Report, the impact of cybercrime according Symantec

Ponemon Institute issued the 2013 Cost of Cyber Crime Study

Ponemon Institute issued the 2013 Cost of Cyber Crime Study HP sponsored a study of Ponemon Institute that reveals Cost of Cybercrime in 2013 escalates 78 Percent while Time to Resolve Attacks […]

Posted in Cyber Security News | Comments Off on Ponemon Institute issued the 2013 Cost of Cyber Crime Study

How to create undetectable malware with Mac encryption mechanism

How to create undetectable malware with Mac encryption mechanism Researcher Daniel Pistelli demonstrated how to exploit Mac internally encryption mechanism to create an undetectable Mac OS X Malware.   During the […]

Posted in Cyber Security News | Comments Off on How to create undetectable malware with Mac encryption mechanism

Upcoming Awards

1st Annual Hot Companies, Best Products and Most Innovative New InfoSec Technologies Awards To Be Held During RSA Conference 2014, as an RSA Conference 2014 Gold Media Sponsor Instructions for […]

Posted in Uncategorized | Comments Off on Upcoming Awards

How NSA tries to compromise Tor anonymity. Tor Stinks document

How NSA tries to compromise Tor anonymity. Tor Stinks document Top-secret presentation Tor Stinks leaked by Snowden shows the techniques implemented by the NSA to overwhelm Tor Anonymity with manual analysis. Tor anonymity […]

Posted in Cyber Security News | Comments Off on How NSA tries to compromise Tor anonymity. Tor Stinks document

Adobe security breach, hackers steal 2.9M accounts and source code

Adobe security breach, hackers steal 2.9M accounts and source code Adobe reveals customer data stolen in security breach, hackers have accessed sensitive information for 2.9 million users and to the […]

Posted in Cyber Security News | Comments Off on Adobe security breach, hackers steal 2.9M accounts and source code

Proxy.sh – Can you trust your VPN provider? Maybe …

Proxy.sh – Can you trust your VPN provider? Maybe … Proxy.sh VPN service with no-logging policy announced to have sniffed the traffic of US based server to Catch Hackers. Can […]

Posted in Cyber Security News | Comments Off on Proxy.sh – Can you trust your VPN provider? Maybe …

F-Secure published Threat Report H1 2013 on security landscape

F-Secure published Threat Report H1 2013 on security landscape Oct 2, 2013 @ 11:10 IT security firm F-Secure has published its Threat Report H1 2013, the document proposes a focus on […]

Posted in Cyber Security News | Comments Off on F-Secure published Threat Report H1 2013 on security landscape

Criminals hacked illegal service exposing Americans to Identity theft

Oct 01, 2013, 10:00 am EST An identity theft service that sells personal information on millions of US citizens has been hacked. Millions of US citizens exposed to Id Theft. […]

Posted in Cyber Security News | Comments Off on Criminals hacked illegal service exposing Americans to Identity theft

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X