Monthly Archives: May 2016
Installing rogue apps on iOS devices via SandJacking Attack
The security expert Chilik Tamir from Mi3 Security has devised a new attack dubbed SandJacking to install rogue apps on iOS devices. The security expert Chilik Tamir from Mi3 Security has devised […]
Pastejacking attack relies on your clipboard as an attack vector
The Pastejacking Attack exploits JavaScript to override the clipboard content and trick victims into running malicious code. The security expert Dylan Ayrey has devised a new attack technique dubbed the Pastejacking […]
Cyberespionage against RUAG, from Red October to Turla, who is the culprit?
Security experts from Melani published a detailed technical report about the strain of Turla used in the cyberespionage attack against the RUAG firm. A few weeks ago I reported about […]
Criminals steal $13m in three hours from ATMs across Japan
Japanese police are investigating coordinated raids across stores in Japan that resulted in the theft of $13m from ATMs in just three hours. Cybercrime doesn’t know boundaries, and in many […]
Lawsuit claims Facebook scanned private messages to make profits
Facebook might have violated federal privacy laws by scanning users’ private messages.Users launched a class action against the IT giant. Once again we are discussing privacy issues and IT giants, […]
The hidden information behind 12,000 PoC Exploits shared online
A study conducted by Recorded Future on PoC exploits shared online over the last year shows that social media is the main distribution channel. Security experts at the threat intelligence firm […]
Hackers can break into a facility by spending $700 on Amazon or eBay
Hackers demonstrated to the Tech Insider how to break into any office by purchasing from Amazon and eBay $700 worth of electronic parts to clone access cards. Breaking into a […]
Malware used in the recent banking cyber heists linked to Sony Pictures hack
Experts at the BAE security firms collected evidence that demonstrates the malware used in the recent cyberheists is linked to 2014 Sony Pictures hack. A second bank was a victim of […]
OpIcarus: Anonymous crusade against the banking industry
Anonymous alongside with BannedOffline and Ghost Squad crews are resuming the OpIcarus targeting banking websites around the world. Hackers of the Anonymous collective alongside with Ghost Squad and BannedOffline continued their attacks on the banks worldwide under […]
CVE-2016-4117 Adobe Flash Zero-Day is being exploited in the wild
CVE-2016-4117 is a zero-day vulnerability affecting the Adobe Flash Player that is being exploited to launch malware-based attacks in the wild. According to Adobe, a new zero-day vulnerability in the […]
Twitter closes the access to the Intel Agencies to Analysis Service
Twitter has blocked the US intelligence agencies from accessing a service that allows the real-time analysis of the content posted online. According to The Wall Street Journal, that cited a […]
How a modern car thief can steal a vehicle by clicking a button
The Channel 2 journalist and Consumer Investigator Jim Strickland investigated a mysterious car theft after he received home security camera footage showing a car thief in action. The Channel 2 journalist […]
Swiss defense department victim of cyber espionage
The Swiss Defense Department was recently victim of a cyber attack, the offensive has come after a presentation on cyber espionage to the FIS. The Swiss Defense Department was recently a victim of […]
The RAF drone fleet will double and will include the new Protector UAVs
The British Britain will introduce in its fleet of armed surveillance drones a new generation of unmanned aircraft including the new Protector aircraft. The British Britain will introduce in its […]
A flaw in the PwnedList service exposed millions of credentials
A serious expert discovered a flaw in PwnedList service that could have been exploited to access millions of account credentials managed by the service. A serious vulnerability found in the […]
Now we know the identity of Satoshi Nakamoto, the Bitcoin inventor
The mystery about the identity of Satoshi Nakamoto, the founder of the Bitcoin currency scheme, seems to be resolved, the man is Craig Steven Wright. The mystery about the identity […]
Draft anti-car hacking law raises concern
Doubts about a couple of draft anti car hacking laws could create serious problems with innocent drivers and cyber security experts. Car hacking is a scaring reality, modern vehicles use a huge quantity […]
Cisco Talos warns that Tuto4PC installed a Backdoor on 12 Million PCs
Security experts from Cisco Talos classified as a backdoor the popular Tuto4PC advertising software installed on a network of 12 Million computers. Security experts from Cisco Talos security intelligence and […]