Monthly Archives: October 2014

Hackers infiltrated a White House unclassified computer network

According to an unnamed official at the White House, hackers infiltrated an unclassified network.The Obama Administration has confirmed the incident. An embarrassing incident involved the computer systems of the Obama Administration, […]

Posted in Cyber Security News | Comments Off on Hackers infiltrated a White House unclassified computer network

Backoff infections rise up to 57 percent increase in Q3

Security firm Damballa issued the ‘State of Infections Report Q3 2014’ that highlights a 57% increase in infections of the notorious Backoff POS malware. Security experts at Damballa security firm detected a 57% increase […]

Posted in Cyber Security News | Comments Off on Backoff infections rise up to 57 percent increase in Q3

Drigo spyware exploits Google Drive in targeted attacks

Security experts at TrendMicro have discovered a cyber espionage campaign which used a malware dubbed Drigo to syphon data through Google Drive. Security experts at TrendMicro have uncovered a new […]

Posted in Cyber Security News | Comments Off on Drigo spyware exploits Google Drive in targeted attacks

Operation Distributed Dragons, thousands of machine compromised worldwide

Operation Distributed Dragons – Tiger Security firm has discovered a series of DDoS attacks from China and that appear as run by a structured organization. Security experts at the Italian […]

Posted in Cyber Security News | Comments Off on Operation Distributed Dragons, thousands of machine compromised worldwide

Malvertising campaigns hit US military industry to steal secrets and intellectual property

A new wave of malvertising attacks finalized to cyber espionage is targeting military contractors to military secrets and intellectual property. Security experts at security company Invincea have uncovered a new malvertising campaign […]

Posted in Cyber Security News | Comments Off on Malvertising campaigns hit US military industry to steal secrets and intellectual property

ICS-CERT states that manufacturing organization compromised for several months

Last ICS-CERT MONITOR report reveals that hackers had access to the systems of an unnamed manufacturing organization for several months. According to the ICS-CERT MONITOR report, which summarizes the Industrial Control […]

Posted in Cyber Security News | Comments Off on ICS-CERT states that manufacturing organization compromised for several months

WAAR report – Web Attacks continue to increase, especially those launched from Amazon servers

Cloud computing is considered an amazing opportunity for cybercrime, from the perspective of an attacher these powerful architectures have the necessary resources to conduct powerful attacks, and consider also that often the data […]

Posted in Cyber Security News | Comments Off on WAAR report – Web Attacks continue to increase, especially those launched from Amazon servers

Leaked programming manual inspired development malware for ATMs

A document on NCR ATM API Documentation disclosed on Baidu may have helped criminals to develop malware used in the recent attacks against ATMs worldwide. Recently Kaspersky Lab spotted a […]

Posted in Cyber Security News | Comments Off on Leaked programming manual inspired development malware for ATMs

Criminal gangs use Tyupkin malware to steal millions from ATMs

Criminal gangs have stolen millions of dollars from ATMs worldwide using the Tyupkin malware which forces machines to dispense cash. Criminal gangs in Eastern Europe are increasing the number of attacks […]

Posted in Cyber Security News | Comments Off on Criminal gangs use Tyupkin malware to steal millions from ATMs

ATM hacking easily with RM100 chip and a free malware

Cybercrime expert explains anyone with technical knowledge, a malware and the help of an insider could easily hack an ATM machine. A RM100 chip, specific technical knowledge and a free malware […]

Posted in Cyber Security News | Comments Off on ATM hacking easily with RM100 chip and a free malware

Bash bug and risks posed by incomplete patches, discovered other two additional bugs

The security researcher Michal Zalewski revealed the details of other two additional bugs he discovered in the Bourne Again Shell after the Bash Bug case. IT community worldwide has been […]

Posted in Cyber Security News | Comments Off on Bash bug and risks posed by incomplete patches, discovered other two additional bugs

FBI identified hackers which stolen intellectual property of Xbox One

A group of hackers was identified by the FBI while trying to sale a mockup of the XBox One for $5,000. A group of men was accused of running a hacking campaign […]

Posted in Cyber Security News | Comments Off on FBI identified hackers which stolen intellectual property of Xbox One

Apple released a patch for the Shellshock vulnerability

Apple has just released its patch for the Shellshock vulnerability. The company provided an update for the OS X Lion, Mountain Lion and Mavericks. A few days ago the Internet […]

Posted in Cyber Security News | Comments Off on Apple released a patch for the Shellshock vulnerability

The Top Ten Mobile Flashlight Applications Are Spying On You. Did You Know?

SnoopWall CEO, Gary Miliefsky, a Founding Member of Department of Homeland Security, Recommends that Everyone with a Mobile Device Should Immediately Delete their Mobile Flashlight Apps by Gary S. Miliefsky, […]

Posted in Cyber Security News | Comments Off on The Top Ten Mobile Flashlight Applications Are Spying On You. Did You Know?

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X