Monthly Archives: March 2014
Coinkrypt Android malware used to mine digital currencies
09:30 ET, 31 March 2014 Experts at Lookout Mobile Security have discovered that cyber criminals are spreading Coinkrypt malware to use victim’s mobile to mine digital currencies. Security experts at Lookout Mobile Security firm have discovered that cyber […]
Gameover ZeuS is Targeting recruitment websites
9:30 ET, 28 March 2014 Security experts at F-Secure have detected a new variant of Gameover ZeuS financial Trojan which is targeting recruitment websites. Zeus Trojan is probably one of the most prolific and […]
Pileup flaws in Android PMS menace more than 1 Billion devices
13:00 ET, 27 March 2014 A group of researchers discovered a series of 6 vulnerabilities, dubbed Pileup flaws, in Android PMS that exposes more than 1 Billion Google-based devices. Android is […]
Another zero-day vulnerability is threatening the Microsoft world
10:00 ET, 26 March 2014 Microsoft issued a security advisory for the presence of a zero-day vulnerability in Microsoft Word products which allows a remote code execution. Another zero-day vulnerability is threatening the […]
For Google it is time to encrypt all GMail connections
15:30 EST, 25 March 2014 Google has announced to have adopted encrypt mechanisms for all Gmail connections to reply to the increasing demand of privacy of Internet users. Google decided to encrypt all […]
IntelCrawler profiled Syrian Electronic Army group
10:30 ET, 24 March 2014 The intelligence firm IntelCrawler has published a report on the activities of the Syrian Electronic Army. Are they hacktivists or cyber spies? IntelCrawler, a cyber-threat intelligence company has […]
Tor browser app in the Apple app store is fake
09:00 ET, 21 March 2014 For more than two months is is present in the official App Store a fake version of the Tor Browser app. It’s full of adware […]
Darpa is looking for experts from private sector for future cyber ops
13:00 ET, 20 March 2014 DARPA is scouting the private companies to recruit highly skilled professional and use company infrastructure to protect classified information. The Pentagon is searching cyber experts to address the growing […]
Nearly 7600 critical infrastructure vulnerable to bugs in Yokogawa App
10:30 ET, 19 March 2014 Security experts at Rapid7 firm have public disclosed a series of flaws affecting several thousands of critical infrastructure using Yokogawa software. Several thousands of critical infrastructure may still be […]
A sophisticated phishing scheme is targeting Google Docs Users
9:30 ET, 18 March 2014 Security Researchers at Symantec detected a new Sophisticated Phishing Scam that is targeting the Google Docs Users with complex social engineering tricks. Phishing is still considerable […]
Syrian Electronic Army hacked the US CENTCOM
10:00 ET, 17 March 2014 Syrian Electronic Army hacked the US CENTCOM and it is threatening to leak secret documents due US decision to hit Syria with electronic warfare attacks. […]
HTTPS traffic analysis can leak user sensitive data
10:00 ET, 14 March 2014 A Team of US researchers at UC Berkeley conducted a study on the HTTPS traffic analysis of ten widely used HTTPS-secured Web sites with surprising […]
$5 Billion in Military Cyber Spending fivefold increase over last year
9:30 ET, 13 March 2014 The Military Cyber Spending reserved by the Pentagon for cyber operations next year is $5 Billion, part of the comprehensive $496 billion fiscal 2015 budget […]
$5 Billion in Military Cyber Spending fivefold increase over last year
9:30 ET, 13 March 2014 The Military Cyber Spending reserved by the Pentagon for cyber operations next year is $5 Billion, part of the comprehensive $496 billion fiscal 2015 budget […]
DNS amplification botnet available in the underground
12:00 ET, 12 March 2014 Security expert Dancho Danchev profiled a recently released DNS amplification DDoS service available for sale in the underground. Recently the cyber security expert Dancho Danchev profiled new DNS […]
Facebook ‘Naked Video’ scam hits 2 million users
12:00 ET, 11 March 2014 Security Experts at Bitdefender discovered a clickjacking Naked Video scam that already infected more that 2 millions Facebook users. Sex and social media is a dangerous mix […]
SNAKE – The last cyber espionage campaign on a large scale
11:00 ET, 10 March 2014 BAE Systems Applied Intelligence has disclosed a Russian cyber espionage campaign codenamed as SNAKE that targeted Governments and Military Networks. The British cyber specialist BAE Systems Applied […]
FireEye 2013 Advanced Threat Report on APTs campaigns
9:30 ET, 7 March 2014 FireEye issued the 2013 Advanced Threat Report, the study provides a high-level overview of the computer network attacks by APTs discovered by the company. Today I […]
Uroburos rootkit, is it part of Russian Cyber weapon programme?
10:30 ET, 6 March 2014 Researchers at German G Data published an interesting analysis for Uroborun rootkit alleged to be a component of Russian cyber weapons programme. Uroburos is considered an advanced rootkit that is active since as […]
Government built malware and cyber weapons will run out of control
10:00 ET, 5 March 2014 F-Secure’s Chief Mikko Hyppönen at the TrustyCon explained the risk that Government-built malware and cyber weapons will run out of control. F-Secure’s Chief Research Officer Company […]
More than 360 million stolen credentials available on the black market
12:00 ET, 4 March 2014 Hold Security firm discovered more than 360 million newly stolen credentials and around 1.25 billion email addresses available for sale on the black market. The […]
Russia Today hacked, tensions from Crimea to cyberspace
10:30 ET, 3 March 2014 Russia Today media agency has been hacked by unknown attackers just after Putin’s order to move troops to the Crimea was approved by the Parliament. The […]