Yearly Archives: 2013
FireEye has identified a new IE zero-day exploit
10:00 ET, 14 November 2013 FireEye Labs has identified a new IE zero-day exploit used for a watering hole attack in the US. As usual it is crucial to track and […]
Google Bot activity abused doing SQL Injection Attacks
10:00 ET, 12 November 2013 Security experts at Securi firm have recently detected a series of SQL Injection attacks conducted abusing of the Google Bot activity. The exploitation of search […]
Stuxnet infected the network of Russian nuclear facility
10:30 ET, 11 November 2013 Eugene Kaspersky revealed that a staffer at the unnamed nuclear Russian plant informed him of the infection of internal network with Stuxnet. We have a […]
I don’t like – Facebook Clickjacking and track screen cursors
10:30 ET, 8 November 2013 A misleading script to increase the number of “I like” and an invasive technology to track screen cursors are threatening the Facebook users. The social media are […]
A Zero-Day Vulnerability in Microsoft Graphics Component – CVE-2013-3906
10:00 ET, 6 November 2013 Microsoft Zero-day CVE-2013-3906 – Microsoft informed to be aware of a vulnerability in a Microsoft graphics component that is actively exploited in targeted attacks using […]
Finland’s Ministry of Foreign Affairs hit by extensive cyber espionage
14:00 ET, 5 November 2013 Finland’s foreign minister announced that foreign intelligence agents had carried out large-scale cyber espionage into government communications. The Finnish Ministry of Foreign Affair networks has been targeted in […]
Anonymous OpNSA Campaign – OSINT to predict DDoS attacks on Nov 5th
17:00 ET, 4 November 2013 OpNSA analyzed with OSINT techniques based on the correlation of media activities and physical protests. The analysts provided a forecast on next attacks. Web Intelligence […]
uProxy, Digital Attack Map and Project Shield,Google to secure the web
1 November 2013, 11:30 EST Google has just revealed the details on tree new technologies, uProxy, Digital Attack Map and Project Shield, to secure the web and to fight censorship. […]
Israel – AP Exclusive reveals tunnel hit by cyber attack
1 November 2013, 15:30 EST Cybersecurity experts revealed that a major artery in Israel’s national road network located in the northern the city of Haifa suffered a cyber attack. Israel […]
Syrian Electronic Army hacked President Obama website and social media
Syrian Electronic Army hacked President Obama website and social media. Syrian Electronic Army Targeted President Obama’s website, Twitter and Facebook accounts and email account linked to his non-profit activities. Once […]
LinkedIn Intro iOS app intercept user’s emails in iPhone and much more
LinkedIn Intro iOS app intercept user’s emails in iPhone and much more LinkedIn launched LinkedIn Intro app for iOS to show LI profiles right inside the native iPhone mail client. […]
Android Wroba banking trojan targeted Korean users
October 25, 2013 – The Antivirus vendor Malwarebytes revealed that the Wroba banking trojan distributed via file sharing sites and alternative markets targeted Korean users. Today I presented at Cyber […]
Root access backdoor discovered in Chinese Tenda Wireless Routers
Root access backdoor discovered in Chinese Tenda Wireless Routers Craig Heffner has discovered a new backdoor in the Wireless Routers produced by China based networking device and equipment manufacturer Tenda […]
Verizon Wireless – how a simple bug could cause a disaster
Verizon Wireless – how a simple bug could cause a disaster A researcher discovered a serious vulnerability in Verizon Wireless’s Web-based customer portal that enabled anyone to download user’s SMS […]
A backdoor present in many D-Link devices allows to bypass authentication
A backdoor present in many D-Link devices allows to bypass authentication Researcher Craig published an interesting blog post on “/dev/ttyS0” on the reverse engineering of the backdoor present in many D-Link […]
Google Chrome users are vulnerable to sensitive data theft
Google Chrome users are vulnerable to sensitive data theft Security experts at Identity Finder demonstrated that Google Chrome users are vulnerable to sensitive Data Theft because the browser stores it […]
How to exploit iFramed based traffic E-shop for illegal activities
17 October 2013 16:00 EST How to exploit iFramed based traffic E-shop for illegal activities What is an E-shop for iFramed traffic and how does cybercrime exploit it? In this post thanks to […]
Blackhole author arrested. The impact on the underground market
Blackhole author arrested. The impact on the underground market The author of the Blackhole exploits kit has been arrested after a long investigation. What will change in the offer of […]
2013 Norton Report, the impact of cybercrime according Symantec
2013 Norton Report, the impact of cybercrime according Symantec Symantec issued 2013 Norton Report, the annual research study which examines the consumers’ online behaviors, the dangers and financial cost of […]
Ponemon Institute issued the 2013 Cost of Cyber Crime Study
Ponemon Institute issued the 2013 Cost of Cyber Crime Study HP sponsored a study of Ponemon Institute that reveals Cost of Cybercrime in 2013 escalates 78 Percent while Time to Resolve Attacks […]
How to create undetectable malware with Mac encryption mechanism
How to create undetectable malware with Mac encryption mechanism Researcher Daniel Pistelli demonstrated how to exploit Mac internally encryption mechanism to create an undetectable Mac OS X Malware. During the […]
Upcoming Awards
1st Annual Hot Companies, Best Products and Most Innovative New InfoSec Technologies Awards To Be Held During RSA Conference 2014, as an RSA Conference 2014 Gold Media Sponsor Instructions for […]
How NSA tries to compromise Tor anonymity. Tor Stinks document
How NSA tries to compromise Tor anonymity. Tor Stinks document Top-secret presentation Tor Stinks leaked by Snowden shows the techniques implemented by the NSA to overwhelm Tor Anonymity with manual analysis. Tor anonymity […]
Adobe security breach, hackers steal 2.9M accounts and source code
Adobe security breach, hackers steal 2.9M accounts and source code Adobe reveals customer data stolen in security breach, hackers have accessed sensitive information for 2.9 million users and to the […]
Proxy.sh – Can you trust your VPN provider? Maybe …
Proxy.sh – Can you trust your VPN provider? Maybe … Proxy.sh VPN service with no-logging policy announced to have sniffed the traffic of US based server to Catch Hackers. Can […]
F-Secure published Threat Report H1 2013 on security landscape
F-Secure published Threat Report H1 2013 on security landscape Oct 2, 2013 @ 11:10 IT security firm F-Secure has published its Threat Report H1 2013, the document proposes a focus on […]
Criminals hacked illegal service exposing Americans to Identity theft
Oct 01, 2013, 10:00 am EST An identity theft service that sells personal information on millions of US citizens has been hacked. Millions of US citizens exposed to Id Theft. […]
Chinese hackers increasingly attracted to the drone technology
Sep 27, 2013, 12:00 pm EST Intelligence agencies reveal that Chinese hackers increasingly attracted to the drone technology while Chinese drone industry grows like never before! The fact that Chinese […]
No good news from ENISA Threat Landscape Mid year 2013
Sep 26, 2013, 11:00 am EST ENISA Threat Landscape Mid year 2013 presents top cyber threats, anticipating its interim Threat Landscape 2013 report. The study reveals concerning trends. ENISA published a […]
Chaos Computer Club claims to have defeated Apple TouchID
Sep 25, 2013, 11:30 am EST Chaos Computer Club claims to have bypassed the biometric security technology Apple TouchID by making a copy of a fingerprint photographed on a glass surface. […]