Monthly Archives: May 2016

Installing rogue apps on iOS devices via SandJacking Attack

The security expert Chilik Tamir from Mi3 Security has devised a new attack dubbed SandJacking to install rogue apps on iOS devices. The security expert Chilik Tamir from Mi3 Security has devised […]

Posted in Cyber Security News | Comments Off on Installing rogue apps on iOS devices via SandJacking Attack

Pastejacking attack relies on your clipboard as an attack vector

The Pastejacking Attack exploits JavaScript to override the clipboard content and trick victims into running malicious code. The security expert Dylan Ayrey has devised a new attack technique dubbed the Pastejacking […]

Posted in Cyber Security News | Comments Off on Pastejacking attack relies on your clipboard as an attack vector

Cyberespionage against RUAG, from Red October to Turla, who is the culprit?

Security experts from Melani published a detailed technical report about the strain of Turla used in the cyberespionage attack against the RUAG firm. A few weeks ago I reported about […]

Posted in Cyber Security News | Comments Off on Cyberespionage against RUAG, from Red October to Turla, who is the culprit?

Criminals steal $13m in three hours from ATMs across Japan

Japanese police are investigating coordinated raids across stores in Japan that resulted in the theft of $13m from ATMs in just three hours. Cybercrime doesn’t know boundaries, and in many […]

Posted in Cyber Security News | Comments Off on Criminals steal $13m in three hours from ATMs across Japan

Lawsuit claims Facebook scanned private messages to make profits

Facebook might have violated federal privacy laws by scanning users’ private messages.Users launched a class action against the IT giant. Once again we are discussing privacy issues and IT giants, […]

Posted in Cyber Security News | Comments Off on Lawsuit claims Facebook scanned private messages to make profits

The hidden information behind 12,000 PoC Exploits shared online

A study conducted by Recorded Future on PoC exploits shared online over the last year shows that social media is the main distribution channel. Security experts at the threat intelligence firm […]

Posted in Cyber Security News | Comments Off on The hidden information behind 12,000 PoC Exploits shared online

Hackers can break into a facility by spending $700 on Amazon or eBay

Hackers demonstrated to the Tech Insider how to break into any office by purchasing from Amazon and eBay $700 worth of electronic parts to clone access cards. Breaking into a […]

Posted in Cyber Security News | Comments Off on Hackers can break into a facility by spending $700 on Amazon or eBay

Malware used in the recent banking cyber heists linked to Sony Pictures hack

Experts at the BAE security firms collected evidence that demonstrates the malware used in the recent cyberheists is linked to 2014 Sony Pictures hack. A second bank was a victim of […]

Posted in Cyber Security News | Comments Off on Malware used in the recent banking cyber heists linked to Sony Pictures hack

OpIcarus: Anonymous crusade against the banking industry

Anonymous alongside with BannedOffline and Ghost Squad crews are resuming the OpIcarus targeting banking websites around the world. Hackers of the Anonymous collective alongside with Ghost Squad and BannedOffline continued their attacks on the banks worldwide under […]

Posted in Cyber Security News | Comments Off on OpIcarus: Anonymous crusade against the banking industry

CVE-2016-4117 Adobe Flash Zero-Day is being exploited in the wild

CVE-2016-4117 is a zero-day vulnerability affecting the Adobe Flash Player that is being exploited to launch malware-based attacks in the wild. According to Adobe, a new zero-day vulnerability in the […]

Posted in Cyber Security News | Comments Off on CVE-2016-4117 Adobe Flash Zero-Day is being exploited in the wild

Twitter closes the access to the Intel Agencies to Analysis Service

Twitter has blocked the US intelligence agencies from accessing a service that allows the real-time analysis of the content posted online. According to The Wall Street Journal, that cited a […]

Posted in Cyber Security News | Comments Off on Twitter closes the access to the Intel Agencies to Analysis Service

How a modern car thief can steal a vehicle by clicking a button

The Channel 2 journalist and Consumer Investigator Jim Strickland investigated a mysterious car theft after he received home security camera footage showing a car thief in action. The Channel 2 journalist […]

Posted in Cyber Security News | Comments Off on How a modern car thief can steal a vehicle by clicking a button

Swiss defense department victim of cyber espionage

The Swiss Defense Department was recently victim of a cyber attack, the offensive has come after a presentation on cyber espionage to the FIS. The Swiss Defense Department was recently a victim of […]

Posted in Cyber Security News | Comments Off on Swiss defense department victim of cyber espionage

The RAF drone fleet will double and will include the new Protector UAVs

The British Britain will introduce in its fleet of armed surveillance drones a new generation of unmanned aircraft including the new Protector aircraft. The British Britain will introduce in its […]

Posted in Cyber Security News | Comments Off on The RAF drone fleet will double and will include the new Protector UAVs

A flaw in the PwnedList service exposed millions of credentials

A serious expert discovered a flaw in PwnedList service that could have been exploited to access millions of account credentials managed by the service. A serious vulnerability found in the […]

Posted in Cyber Security News | Comments Off on A flaw in the PwnedList service exposed millions of credentials

Now we know the identity of Satoshi Nakamoto, the Bitcoin inventor

The mystery about the identity of Satoshi Nakamoto, the founder of the Bitcoin currency scheme, seems to be resolved, the man is Craig Steven Wright. The mystery about the identity […]

Posted in Cyber Security News | Comments Off on Now we know the identity of Satoshi Nakamoto, the Bitcoin inventor

Draft anti-car hacking law raises concern

Doubts about a couple of draft anti car hacking laws could create serious problems with innocent drivers and cyber security experts. Car hacking is a scaring reality, modern vehicles use a huge quantity […]

Posted in Cyber Security News | Comments Off on Draft anti-car hacking law raises concern

Cisco Talos warns that Tuto4PC installed a Backdoor on 12 Million PCs

Security experts from Cisco Talos classified as a backdoor the popular Tuto4PC advertising software installed on a network of 12 Million computers. Security experts from Cisco Talos security intelligence and […]

Posted in Cyber Security News | Comments Off on Cisco Talos warns that Tuto4PC installed a Backdoor on 12 Million PCs

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X