Tuesday, November 12, 2019
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST
Home News Page 225

News

Israeli Defense computer hacked via spear phishing attack

9:00 ET, 30 January 2014 Aviv Raff, CTO at Seculert, confirmed that the attackers have penetrated into the network of Israeli Defense accessing to 15 computers. Israeli Defense is another illustrious victim of spear phishing attack, just on Friday Microsoft suffered a similar attack and attackers...

Discovered first Win trojan to serve banking Android malware on mobile

10:00 ET, 29 January 2014 Symantec experts recently came across a Windows malicious code that attempts to infect connected Android devices serving an Android malware. Researchers at Symantec antivirus firm have discovered a malicious code that is able to infect Android mobile device with a banking malware during synchronization....

Spear phishing against Microsoft, exposed law enforcement inquiries

9:00 ET, 28 January 2014 Attackers breached the email accounts of Microsoft staff, probably with a spear phishing attack, accessing to documents on law enforcement inquiries. Spear phishing attacks are within most insidious attacks for private companies and organizations, they are primarily...

Arts and crafts retailer Michaels Stores Inc warns over credit card fraud

10:00 ET, 27 January 2014 Michaels Stores Inc., US-based arts-and-crafts retailer, confirmed it is investigating a possible data breach affecting customer cards. Michaels Stores Inc., US-based arts-and-crafts retailer maybe is the last victim of a massive data breach, a few weeks after...

Privacy violation: NSA is not the only eavesdropper

11:00 ET, 24 January 2014 Privacy violation: NSA is not the only eavesdropper The hue and cry over the actions of NSA is making the headlines regularly these days, with even the international leaders giving America a piece of their mind...

Who is spying Tor on network exit nodes from Russia?

10:00 ET, 24 January 2014 Researchers Winter and Lindskog identified 25 nodes of Tor network that tampered with web traffic, decrypted the traffic, or censored websites. Two researchers, Philipp Winter and Stefan Lindskog of Karlstad University in Sweden, presented the results of a four-month study  conducted...

Weak passwords, in 2013 it is still a frequent error

12:00 ET, 23 January 2014 SplashData has issued its Annual “25 Worst Passwords of the Year” enumerating the list of the most common password chosen by users. It was October 2012 when for the first time I've seen a report from...

An increasing number of targeted attacks against the energy sector

10:00 ET, 21 January 2014 Symantec published in the report titled "Targeted Attacks Against the Energy Sector" to describe the security landscape for companies of the sector. Companies and industries belonging in the energy sector are waiting most targeted sectors on...

IoT – Discovered first Internet of Things cyberattack on large-scale

10:00 ET, 20 January 2014 Proofpoint discovered more Than 750,000 Phishing and SPAM Emails Launched From "Thingbots" Including Televisions, Fridge Recently security researchers from Proofpoint uncovered a cyber attack against the Internet of Things (IoT), more than 100,000 Refrigerators, Smart TVs and other smart household...

CDM Newsflash: TeamBerserk Hacked DHS Fusion Center Documents

Hackers from the group TeamBerserk announced to have leaked numerous sensitive documents from systems of some DHS Intelligence Fusion Centers. January 20, 2014  1:00 AM EST The Group of hackers known as TeamBerserk claim to have stolen 54mb of compressed documents from...

STAY CONNECTED

36,057FansLike
56,196FollowersFollow
Show Buttons
Hide Buttons