Monthly Archives: July 2016

Is Infocube tied to the Carbanak cybercrime gang?

The security expert Brian Krebs investigated the links between the Carbanak cybercrime gang and the Infocube security firm. Today I want to share with you the findings of an investigation […]

Posted in Cyber Security News | Comments Off on Is Infocube tied to the Carbanak cybercrime gang?

Snowden and Andrew “Bunnie” Huang devised the Introspection Engine to avoid surveillance

The NSA whistleblower Edward Snowden and the popular hacker Andrew “Bunnie” Huang designed Introspection Engine, an interesting anti-surveillance device. While the number of mobile devices is outclassing the number of […]

Posted in Cyber Security News | Comments Off on Snowden and Andrew “Bunnie” Huang devised the Introspection Engine to avoid surveillance

Turkish Government Blocks Access To WikiLeaks

The Turkish Government blocked the access to WikiLeaks after release of the Erdogan emails, 300,000 government emails date 2010 to July this year. Cyberspace and the real world are even more […]

Posted in Cyber Security News | Comments Off on Turkish Government Blocks Access To WikiLeaks

OpenSSH affected by a user enumeration bug

The popular OpenSSH is affected by a user enumeration bug that could be exploited by a remote attacker to check a list of hacked credentials. A bug (CVE-2016-6210) in the […]

Posted in Cyber Security News | Comments Off on OpenSSH affected by a user enumeration bug

Android.Fakebank.B inhibits outgoing calls to bank customer services

Security researchers from Symantec have discovered a new variant of the Android.Fakebank.B banking trojan that prevents users from calling banks. Security experts from Symantec have spotted a new strain of […]

Posted in Cyber Security News | Comments Off on Android.Fakebank.B inhibits outgoing calls to bank customer services

Experts published IE Exploit code and crooks added it to Neutrino EK

Operators behind the Neutrino EK have added the code to exploit an Internet Explorer flaw that  was recently patched with the release of the MS16-053. Operators behind the infamous Neutrino EK have […]

Posted in Cyber Security News | Comments Off on Experts published IE Exploit code and crooks added it to Neutrino EK

Unmasking malware’s use of TLS without flow decryption

Researchers devised a method to unmask malware’s use of TLS without decrypting the data flow. The technique relies on analysis of observable data features. A team of security experts from […]

Posted in Cyber Security News | Comments Off on Unmasking malware’s use of TLS without flow decryption

PoS systems infected in 1 in 20 Wendy’s stores, credit card exposed

The hack suffered by Wendy’s fast-food chain was bigger than thought, payment card data exposed in more than 1000 stores. The hack suffered by Wendy’s fast-food chain was bigger than thought […]

Posted in Cyber Security News | Comments Off on PoS systems infected in 1 in 20 Wendy’s stores, credit card exposed

NetTraveler APT still targets European and Russian interests

Security experts from ProofPoint have spotted a new campaign operated by the APT Group NetTraveler that is targeting Russian and European organizations. NetTraveler is an ATP group first spotted by Kaspersky […]

Posted in Cyber Security News | Comments Off on NetTraveler APT still targets European and Russian interests

Espionage SBDH Toolkit used to target European Countries

ESET security firm has uncovered an espionage toolkit dubbed SBDH that was used in espionage campaigns targeting government organizations in Europe. Security experts from ESET security firm have spotted an […]

Posted in Cyber Security News | Comments Off on Espionage SBDH Toolkit used to target European Countries

Boffins spotted over 100 snooping Tor HSDir nodes spying on Dark Web sites

Two security experts have conducted a study that allowed them to spot over 100 snooping Tor Nodes spying on Dark Web Sites. The attempts of snooping traffic from Tor nodes […]

Posted in Cyber Security News | Comments Off on Boffins spotted over 100 snooping Tor HSDir nodes spying on Dark Web sites

Breaking Android Full-Disk Encryption, not so hard on Qualcomm devices

The Android full-disk encryption can be easily cracked with a brute force attack, hundreds of millions of Android mobile are at risk. Bad news for Android users that want to […]

Posted in Cyber Security News | Comments Off on Breaking Android Full-Disk Encryption, not so hard on Qualcomm devices

Global terror database World-Check leaked online

The Thomson Reuters terrorist database World-Check used by banks and intelligence agencies worldwide was leaked online, 2.2 million records exposed. There is a terrorist database used by banks and intelligence […]

Posted in Cyber Security News | Comments Off on Global terror database World-Check leaked online

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X