Home News Page 189

News

Kaspersky reveals Kimsuky operation that is targeting South Korea.

Sep 16, 2013, 11:00 am EST After months of investigation security researchers from Kaspersky have detected a new cyber espionage campaign dubbed Kimsuky that targeted South Korean organizations. Kaspersky experts have discovered a new cyber espionage campaign dubbed Kimsuky due the names...

A look to Android offer in the underground mobile market

Sep 13, 2013, 03:30 pm EST Security experts continue to observe the evolution of the offer of services and malicious software for fraudsters in the Android underground mobile market. In the last months security firms have observed an increase in criminal activities that exploited Android OS supported...

Mevade botnet responsible for the spike in Tor traffic

Sep 12, 2013, 11:30 am EST Security researchers at Fox-IT firm found evidence that the spike in Tor traffic is caused by a Mevade botnet that hides its C&C in the anonymizing network. Is the Mevade malware the real responsible for the spike observed in the number of users...

Hesperbot, the new powerful banking Trojan found by ESET

Sep 11, 2013, 11:30 am EST Hesperbot is the name of a new banking Trojan detected by ESET, it is a very potent malware which includes some very advanced tricks. Hesperbot is the name of the last banking trojan detected by security firm ESET, a malware that due its...

Surveillance – NSA can access data on your mobile device

Sep 10, 2013, 11:30 am EST The German news agency Der Spiegel reported last act of US surveillance, the NSA is able to access data stored in a wide range of mobile devices including Android, iPhone and BlackBerry. Here we are with weekly news on NSA surveillance activities, last week we...

Are You Inviting Hackers into Your Network?

by Peter Martini, COO iboss Security It no longer requires high tech tools to hijack an imperiled network.  Are you using a traditional MDM solution?  You could be leaving the backdoor to your network swinging wide open for anyone to...

A Hidden Gem for INFOSEC Certification Practice

More than 150,000 people have used the CCCure’s resources over the past 12 years to reach their certification and career goals. CCURE.org offers some of the most complete and relevant quizzes for the CISSP® and the CEH® certifications. They also have...

US Government Cyber News – October 2012

U.S. Department of Homeland Security – Cyber security Report CYBERCRIME: Proxy service a front for malware distribution. Hundreds of thousands of users who signed up for an inexpensive proxy service called Proxybox.name ended up installing a trojan linked to a...

STAY CONNECTED

36,307FansLike
55,427FollowersFollow
Show Buttons
Hide Buttons