Home News

News

European Parliament decides to ban Kaspersky products because they claim they are malicious

Calls on the EU to perform a comprehensive review of software, IT and communications equipment and infrastructure used in the institutions in order to exclude potentially dangerous programmes and devices, and to ban the ones that have been confirmed...

Brazilian “Car Wash” Task Force: Cyber Security Lessons

By Rodrigo Ruiz & Rogério Winter The creators of House of Cards have publicly stated that their work is Discovery Kids. Brazil already stars in a reality show worthy of Discovery ID. The world follows our events as if they...

Rail Europe North America hit by payment card data breach

Rail Europe North America (RENA) notifies customers of a security breach, crooks compromised its website with a malware used to siphon payment card data. The website allows users to buy European train tickets, according to the company the data breach lasted at least...

Symantec confirms that Longhorn group is tied to CIA operators detailed in Vault 7

Symantec reportedly linked the CIA hacking tools to a number of cyber attacks powered across the years by the Longhorn group. Security experts who analyzed the alleged CIA hacking tools included in the Vault 7 dump have been used against at least 40 governments...

iBanking Mobile Bot Source Code available for sale in the underground

9:30 ET, 27 February 2014 iBanking is a new mobile banking Trojan available for sale in the underground for $5,000 according the RSA's FraudAction Group.  The source code for iBanking banking trojan has been leaked online through an underground forum, this kind of news reports a...

Pastejacking attack relies on your clipboard as an attack vector

The Pastejacking Attack exploits JavaScript to override the clipboard content and trick victims into running malicious code. The security expert Dylan Ayrey has devised a new attack technique dubbed the Pastejacking attack that leverages on the victim's clipboard. The possibility of manipulating the clipboard...

SSH: The Two-Edged Sword in Your Security Strategy

What you don’t know can hurt you by Thomas MacIsaac, Cybersecurity Strategist, SSH Communications Security Cybercrime is as old as the internet, which means there has always been a need for cybersecurity. One of these bits of security is the Secure...

US authorities dismantled Insider Trading Ring Nets $100M

US authorities have identified and arrested members of an international ring of hackers and stock traders specialized in the theft of trading info. The Department of Justice charged a group of nine hackers and stock traders in a criminal conspiracy...

How to hack surveillance cameras from 70 vendors

A security researcher has discovered that surveillance cameras sold by more than 70 vendors worldwide were vulnerable to Remote Code Execution (RCE). According to the security researcher Rotem Kerner, surveillance cameras from 70 vendors are vulnerable to Remote Code Execution (RCE). The researcher...

FacexWorm targets cryptocurrency users and spreads through Facebook Messenger

Social networks could be a privileged attack vector to rapidly spread a malware to a huge audience, FacexWorm targets cryptocurrency users by spreading through Facebook Messenger. Social networks could be a privileged attack vector to rapidly spread a malware to...

STAY CONNECTED

36,307FansLike
55,427FollowersFollow
Show Buttons
Hide Buttons