Monthly Archives: October 2015

WhatsApp collects phone numbers, call duration, and a lot of metadata

A group of experts has conducted a research that demonstrates the type of data that can be gathered through the forensic study of WhatsApp. A new research conducted by forensic […]

Posted in Cyber Security News | Comments Off on WhatsApp collects phone numbers, call duration, and a lot of metadata

15-Year-Old has been identified and arrested for TalkTalk Attack

The UK Metropolitan Police announced to have arrested on suspicion of Computer Misuse Act offenses a 15-Year-Old alleged involved in the TalkTalk attack. The UK Metropolitan Police has announced the […]

Posted in Cyber Security News | Comments Off on 15-Year-Old has been identified and arrested for TalkTalk Attack

Duuzer, a data stealer Trojan targets South Korean organizations

Researchers at Symantec uncovered bad actors that have been using a backdoor Trojan dubbed Duuzer to target organizations in South Korea and elsewhere. According to Symantec, threat actors have been […]

Posted in Cyber Security News | Comments Off on Duuzer, a data stealer Trojan targets South Korean organizations

Germany probes alleged new case of US espionage: Regin malware infected Gov laptop

The German authorities have launched a probe into allegations of a new case of US espionage after they have found a laptop infected by the Regin Spyware. The German authorities […]

Posted in Cyber Security News | Comments Off on Germany probes alleged new case of US espionage: Regin malware infected Gov laptop

TalkTalk announced hackers have stolen ‘incomplete’ customer bank data

Hackers that recently breached the systems at TalkTalk IPS have stolen ‘incomplete’ customer bank data, states an official announcement issued by the firm. This week the TalkTalk Telecom Group plc has publicly […]

Posted in Cyber Security News | Comments Off on TalkTalk announced hackers have stolen ‘incomplete’ customer bank data

Wikileaks releases CIA Director John Brennan emails

Wikileaks has obtained and immediately released the CIA Director John Brennan private emails. It is a first lot, others will be soon published. A few days ago a teen has violated […]

Posted in Cyber Security News | Comments Off on Wikileaks releases CIA Director John Brennan emails

The ISIL is trying to hack American electrical power companies

US authorities confirmed that hackers belonging to the Islamic State (ISIL) are trying to hack American electrical power companies. According to the U.S. law enforcement, the ISIL is trying to […]

Posted in Cyber Security News | Comments Off on The ISIL is trying to hack American electrical power companies

Pawn Storm used a new Flash Zero-Day in attacks on the NATO & the White House

Researchers at Trend Micro discovered a new Adobe Flash Zero-Day used in Pawn Storm Campaign Targeting Foreign Affairs Ministries across the world. Once again Flash in the headlines, beware next […]

Posted in Cyber Security News | Comments Off on Pawn Storm used a new Flash Zero-Day in attacks on the NATO & the White House

US Ports – Cyber attacks can cause the release of dangerous chemicals

US Ports are still vulnerable to cyber attacks that release dangerous chemicals, cybersecurity in the maritime industry is crucial for Homeland security. Critical infrastructure across the world are vulnerable to cyber […]

Posted in Cyber Security News | Comments Off on US Ports – Cyber attacks can cause the release of dangerous chemicals

Apple has removed several apps from the official iOS App Store

Apple has removed mobile apps from the iOS Apple store that are installing root CA certificates that enable traffic to be intercepted. Apple has pulled several apps out from the […]

Posted in Cyber Security News | Comments Off on Apple has removed several apps from the official iOS App Store

MEF – Annual Report 2015 – Payment card frauds

The CENTRAL MEANS OF PAYMENT ANTIFRAUD OFFICE (UCAMP) of the Italian Ministry of Economy and Finance released the annual report on Payment card frauds. This year I’m among the experts who […]

Posted in Cyber Security News | Comments Off on MEF – Annual Report 2015 – Payment card frauds

China arrested hackers responding to a US Government request

For the first time, hackers have been arrested in China by law enforcement at the behest of the US government. Is it true cooperation? It is probably the first time that […]

Posted in Cyber Security News | Comments Off on China arrested hackers responding to a US Government request

Hacking enterprise wireless Printers with a drone or a vacuum cleaner

A group of researchers from the iTrust has demonstrated how to use a Drone to intercept wireless printer transmissions from outside an office building. Recently I wrote a blog post […]

Posted in Cyber Security News | Comments Off on Hacking enterprise wireless Printers with a drone or a vacuum cleaner

The Smurf Suite – GCHQ can hack your phone with a text message

Snowden told the BBC’s Panorama that the GCHQ has developed a hacking suite dubbed Smurf Suite, it can hack any mobile by sending an encrypted text message. There is no […]

Posted in Cyber Security News | Comments Off on The Smurf Suite – GCHQ can hack your phone with a text message

Fareit malware avoids detection using a different file hash for each attack

Security experts at Cisco Talos have discovered a new strain of the Fareit Info stealer that uses a different File hash for each attack to avoid AV Detection Security experts […]

Posted in Cyber Security News | Comments Off on Fareit malware avoids detection using a different file hash for each attack

YiSpecter iOS Malware can infect any Apple iOS device

Experts at Paloalto Networks discovered a strain of Apple iOS malware dubbed YiSpecter that is able to infect both jailbroken and non-jailbroken devices. The recent XCodeGhost attack suffered by Apple demonstrated that […]

Posted in Cyber Security News | Comments Off on YiSpecter iOS Malware can infect any Apple iOS device

Experian’s data breach puts 15 million T-Mobile users at risk

Experian’s data breach puts 15 million T-Mobile users’ personal information at risk- The company already started the incident response procedure. T-Mobile has announced that data belonging to 15 million consumers may have compromised in a […]

Posted in Cyber Security News | Comments Off on Experian’s data breach puts 15 million T-Mobile users at risk

Linux XOR DDoS Botnet delivers potent DDoS attacks

Experts at Akamai discovered the Linux XOR DDoS Botnet,  a malicious infrastructure used to run potent DDoS attacks against dozens of targets. Security researchers have discovered a Linux Botnet, dubbed XOR […]

Posted in Cyber Security News | Comments Off on Linux XOR DDoS Botnet delivers potent DDoS attacks

Are you still using TrueCrypt? Beware of these 2 critical flaws!

The popular security expert James Forshaw has discovered two critical flaws in the driver that TrueCrypt installs on Windows systems. Bad news for Windows users who have decided to use […]

Posted in Cyber Security News | Comments Off on Are you still using TrueCrypt? Beware of these 2 critical flaws!

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X