Yearly Archives: 2013

The cyber capabilities of Iran can hit US

Aug 15, 2013, 11:30 am EST A study titled “Iran:How a Third Tier Cyber Power Can Still Threaten the United States” states that Iran has sufficient cyber capabilities to attack […]

Posted in Uncategorized | Comments Off on The cyber capabilities of Iran can hit US

AndroRAT drives the rise for DIY Android hacking tools

Aug 14, 2013, 11:30 am EST AndroRAT is just one of the numerous open-source tools that was created and published on the undergroud forums to allow the hack of Android mobile devices. […]

Posted in Uncategorized | Comments Off on AndroRAT drives the rise for DIY Android hacking tools

Comment Crew group of hackers has been identified during an attack…

Aug 13, 2013, 11:30 am EST Chinese Hacking Team Comment Crew caught taking over a honeypot simulating a Water Plant, the infinite offensive of Chinese Cyber Units linked to PLA. The Comment Crew group […]

Posted in Uncategorized | Comments Off on Comment Crew group of hackers has been identified during an attack…

DNS impairment redirects thousands of websites to malware

Aug 12, 2013, 11:30 am EST Cyber-criminals are exploiting the possibility of DNS impairment to redirects visitors of thousands legitimate websites to compromised domains used to serve malware. DNS impairment or rather compromising DNS […]

Posted in Uncategorized | Comments Off on DNS impairment redirects thousands of websites to malware

FBI is using mobile Android malware to spy on suspect

Aug 09, 2013, 11:30 am EST Former FBI officers revealed to the Wall Street Journal the existence of FBI Android malware that is used to spy on suspects for investigations. The FBI […]

Posted in Uncategorized | Comments Off on FBI is using mobile Android malware to spy on suspect

Vulnerability in Windows Phone OS could allow information disclosure

Aug 08, 2013, 11:00 am EST Microsoft Security Advisory reveals vulnerability in Windows Phone OS that could allow information disclosure. Microsoft has issued a security advisory related to vulnerability in Windows Phone OS […]

Posted in Uncategorized | Comments Off on Vulnerability in Windows Phone OS could allow information disclosure

Breach, the new attack techniques against SSL TSL

Aug 07, 2013, 11:00 am EST The HTTPS cryptographic scheme is menaced by the BREACH attack that allows hackers to capture security credentials, email addresses and much more from encrypted […]

Posted in Uncategorized | Comments Off on Breach, the new attack techniques against SSL TSL

Cyber espionage – White House employees personal email hacked

Aug 06, 2013, 11:00 am EST At least three White House employees personal Gmail accounts hacked by the popular group of hackers know as Syrian Electronic Army (SEA). White House […]

Posted in Uncategorized | Comments Off on Cyber espionage – White House employees personal email hacked

XKeyscore, revealed another surveillance tool used by NSA

Aug 05, 2013, 11:30 am EST Snowden revealed that NSA designed a system called XKeyscore considered the “widest-reaching” architecture for developing intelligence from the internet. XKeyscore, NSA former technicians Edward Snowden revealed that the agency […]

Posted in Uncategorized | Comments Off on XKeyscore, revealed another surveillance tool used by NSA

Superfecta report Q2 2013, constant increase for automated attacks

Aug 01, 2013, 11:30 am EST FireHost Secure cloud hosting company issued Q2 2013 Superfecta report that revealed a sharp increase in blended, automated attacks. FireHost announced the Q2 2013 Superfecta report, an interesting […]

Posted in Uncategorized | Comments Off on Superfecta report Q2 2013, constant increase for automated attacks

Black Hat USA 2013 – Insider Only Content

Pictures found here:   http://www.flickr.com/photos/blackhatevents/  Keynotes, Whitepapers and Presentations found here: https://www.blackhat.com/us-13/archives.html shhhhhh…it’s a secret – don’t tell anyone, ok?

Posted in Uncategorized | Comments Off on Black Hat USA 2013 – Insider Only Content

New Best Practices for Detecting Malware in the 21st Century

Jul 31, 2013, 11:30 am EST By Stephen Newman, Vice President of Products, Damballa Detecting malicious network behavior isn’t as straightforward as it used to be. Organizations can no longer […]

Posted in Uncategorized | Comments Off on New Best Practices for Detecting Malware in the 21st Century

Researcher demonstrated SmartTV hacking on Samsung models

Jul 30, 2013, 11:00 am EST The researcher Malik Mesellem demonstrated that SmartTV hacking is a real menace, Samsung models could be forced to reboot sending an HTTP GET request It is […]

Posted in Uncategorized | Comments Off on Researcher demonstrated SmartTV hacking on Samsung models

Context Information Security report “Web Application Vulnerability Statistics 2013

Jul 29, 2013, 11:30 am EST Context Information Security  issued the report “Web Application Vulnerability Statistics 2013” that provides statistic on Web Application Vulnerabilities based on data gathered from a […]

Posted in Uncategorized | Comments Off on Context Information Security report “Web Application Vulnerability Statistics 2013

Vulnerability disclosed pwds of all Barracuda Network Employees

Jul 25, 2013, 11:30 am EST The cyber security Analyst @Qcert Ebrahim Hegazy(@Zigoo0) has found a Password disclosure vulnerability in one of Barracuda update servers which allows the attackers to gain access […]

Posted in Uncategorized | Comments Off on Vulnerability disclosed pwds of all Barracuda Network Employees

Who has hacked the Apple iOS Developer Center?

Jul 24, 2013, 11:30 am EST After a weekend of outage and various mysterious password reset emails Apple has revealed that the iOS Developer Center was hacked. After 3 days […]

Posted in Uncategorized | Comments Off on Who has hacked the Apple iOS Developer Center?

Security experts uncovered an unusual cyber espionage ….

Jul 23, 2013, 01:00 pm EST Security experts uncovered an unusual cyber espionage campaign based on file infector belonging to the PE_EXPIRO family that includes information theft module Security experts […]

Posted in Uncategorized | Comments Off on Security experts uncovered an unusual cyber espionage ….

Hackers breach Nasdaq community forum website

Jul 22, 2013, 06:30 pm EST By Matthew Finnegan Trend Micro uncovered targeted attack against European and Asian government agencies to steal login credentials from IE and Microsoft Outlook products. Hackers […]

Posted in Uncategorized | Comments Off on Hackers breach Nasdaq community forum website

Korea sets out to train more cyber experts, hackers

Jul 22, 2013, 11:30 am EST By Jin Eun-soo and Choi Jung-min South Korea is taking belated-yet-necessary-steps to train more cyber security experts following a series of disruptive hacking attacks […]

Posted in Uncategorized | Comments Off on Korea sets out to train more cyber experts, hackers

Trend Micro – targeted attack against Europe-Asia government agencies

Jul 22, 2013, 11:30 am EST Trend Micro uncovered targeted attack against European and Asian government agencies to steal login credentials from IE and Microsoft Outlook products. A new targeted […]

Posted in Uncategorized | Comments Off on Trend Micro – targeted attack against Europe-Asia government agencies

Cyber Intelligence Europe 2013

CYBER INTELLIGENCE EUROPE  17-19 September 2013 Venue : Renaissance Marriott Brussels Hotel, Brussels, Belgium Jul 18, 2013, 04:00 pm EST EARLY BIRD OFFER EXPIRES ON THE 31st JULY 2013 – BOOK TODAY […]

Posted in Uncategorized | Comments Off on Cyber Intelligence Europe 2013

Gaming platforms under attack – Nintendo and Ubisoft hacks

Jul 17, 2013, 11:00 am EST The number of attacks against gaming platforms is constantly increasing, the recent data breach occurred to Nintendo and Ubisoft are just the tip of […]

Posted in Uncategorized | Comments Off on Gaming platforms under attack – Nintendo and Ubisoft hacks

Researchers can hack Verizon Wireless femtocells to spy on customers

Jul 17, 2013, 07:00 pm EST Two security researchers announced that they have succeeded to transform Verizon mobile phones into spy tools to track Verizon’s users. The security experts revealed […]

Posted in Uncategorized | Comments Off on Researchers can hack Verizon Wireless femtocells to spy on customers

Oil & Natural Gas Cyber Security – CYpBER 2013

When: 20 November, 2013 Where: Nicosia, Cyprus Don’t miss the Oil & Natural Gas Cyber Security – CYpBER 2013 – Nicosia, Cyprus. Cyber-attacks in Oil and Natural Gas trade, will have major […]

Posted in Uncategorized | Comments Off on Oil & Natural Gas Cyber Security – CYpBER 2013

Cybercriminals Leveraging Facebook is the title of a research

Jul 15, 2013, 11:30 am EST Cybercriminals Leveraging Facebook is the title of a research that provided evidence that criminal organizations are exploiting Facebook for illegal activities. Cybercriminals Leveraging Facebook, this […]

Posted in Uncategorized | Comments Off on Cybercriminals Leveraging Facebook is the title of a research

Are You Inviting Hackers into Your Network?

by Peter Martini, COO iboss Security It no longer requires high tech tools to hijack an imperiled network.  Are you using a traditional MDM solution?  You could be leaving the […]

Posted in Cyber Security News | Comments Off on Are You Inviting Hackers into Your Network?

Hackers hit South Korea also spread spyware to steal military secrets

Jul 11, 2013, 11:00 am EST Mac Afee Lab experts revealed that hackers behind large scale cyber-attacks against South Korea also designed malware to steal military secrets. The hackers behind […]

Posted in Uncategorized | Comments Off on Hackers hit South Korea also spread spyware to steal military secrets

The cybercrime ecosystem, resources,motivations and methods

Jul 10, 2013, 11:00 am EST Information provided by the results of principal researches on the cybercrime reveals resources,motivations and methods and cost illegal operations. Fortinet has published early 2013 […]

Posted in Uncategorized | Comments Off on The cybercrime ecosystem, resources,motivations and methods

Android Hack-Tool discovered by F-Secure

Jul 9, 2013, 11:30 am EST Android Hack-Tool discovered by F-Secure confirming that cyber threats targeting Android devices are rapidly growing in quantity and sophistication level. F-Secure have recently announced […]

Posted in Uncategorized | Comments Off on Android Hack-Tool discovered by F-Secure

Best Practices for Keeping Assets Safe In Virtualized Data Centers

Jul 8, 2013, 05:00 pm EST Virtualization has redefined the data center and, in so doing, created a new approach to network architecture. An environment that converts servers into files, […]

Posted in Uncategorized | Comments Off on Best Practices for Keeping Assets Safe In Virtualized Data Centers

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X