id
stringlengths
3
10
content
stringlengths
2
25k
3244_43497
A Reddit user with username being “moeburn” raised the likelihood of new malware flowing for Smart TVs, this week:, My sister got a virus on her TV. A VIRUS ON HER GODDAMN TV., It was an LG Smart TV with a built-in web browser, and she managed to get a DNS Hijacker that would say “Your computer is infected please send ...
759_18110
Researchers at Kaspersky Lab sustain to have identifies a group of cyber mercenaries called Icefog that is responsible for a huge cyber espionage campaign, occurred in 2011, against Japanese parliament and dozens of government agencies and strategic companies in Japan and South Korea., The cyber mercenaries are recruit...
1579_29589
Once again Tor network is under attack, the researcher Josh Pitts of Leviathan Security Group has identified a Tor exit node that was used to patch the binaries downloaded by the users, the threat actors were adding malware to the files dynamically., The Tor is a system that allows to anonymize users’ online experience...
79_1680
To news like this we are dangerously getting used, the scenarios change but the dynamics are often the same, viruses used such as cyber weapon that infect critical structures, causing loss of valuable information and that block system of target systems., The news has been announced  by the same “Japan Aerospace Explora...
2278_36741
The terrorism is probably the first concern for the US Government, the Americans fears a possible and imminent attack on the US soil. In an interview with ABC News, Jeh Johnson, the current United States Secretary of Homeland Security, explained that the Islamic State represents a serious threat for the Homeland Securi...
3219_43338
According to a final rule published in the Federal Register on the last day of 2015 (Dec. 31, 2015),  US can now apply economic sanctions in response to cyber attacks., The US Government assigned to the Department of the Treasury’s Office of Foreign Assets Control the authorities to apply economic sanctions against for...
1390_27409
Goldshlager highlights the similitude of the XML quadratic blowup attack with the Billion Laughs attack, it basically exploits the use of entity expansion, this means that it replicates one large entity using a couple thousand characters repeatedly., “A medium-sized XML document of approximately two hundred kilobytes m...
2064_35002
In January, an unnamed man came into possession of the live.fi certificate after noticing that he was able to use hostmaster@live.fi as an alias for his normal e-mail address., The news was spread by Tivi.fi, the man discovered in this way that it was a highly privileged address that allowed him to automatically receiv...
6587_71549
Microsoft has a surprise for Chrome users in the Chrome Web Store, it’s the new Windows Defender Browser Protection extension that aims to protect them from online threats., The new extension will help users in avoiding phishing emails, as well as, websites delivering malware., links in phishing emails, as well as webs...
78_1656
In these hours on the web is turning the news of a cyber attack performed by a group of Chinese hackers against some U.S. Government Agencies. Once again, the weapon used against the strategic objectives is a cyber weapon, in particular it has been used a new version of the trojan Sykipot., , Chinese hackers have deplo...
3666_46730
A few days ago, the US Government announced the first attack conducted by the Cyber Command against members of the ISIS online. The US Cyber Command will run hacking operations and use cyber weapons to destroy computer systems used by the ISIL, destroy it functions (e.g. propaganda, economic support to militants) and t...
1476_28369
Copies of the surveillance software “FinFisher” were made available for public scrutiny by WikiLeaks early this week. The international, online journalistic organization has decided to publish the public disclose the criticized software online to allow exponents of the security community to conduct a technical review o...
4608_54326
The number of ransomware infections suffered by companies continues to increase and according to a new report published by the security firm Kaspersky Lab, it increased threefold from January to September., One in every five businesses worldwide has been victims of a ransomware and the rate of ransomware attacks increa...
5262_59450
The WannaCry emergency could not be ended because the NSA dump leaked by the Shadow Brokers team included many other dangerous exploits., Last months the Shadow Brokers group released another batch of data containing exploit codes still unpatched by Microsoft such as the “EnglishmanDentist,” “EsteemAudit,” and “Explodi...
1695_30769
Google’s new API simplifies the reCAPTCHA experience, product manager Vinay Shet said., Google has provided a significant update to its reCAPTCHA authentication system with the intent to simplify the process. The CAPTCHA is a type of challenge-response test used to determine whether or not the entity that is requesting...
3301_43931
The collective Anonymous has launched a DDoS attack that shut down the Website of the Japanese Narita International Airport on Friday night (at around 9:30 p.m) until Saturday (around 1 a.m). The attack has been confirmed by the Japanese authorities explaining that a series of DDoS attacks caused the block of the websi...
5089_57980
SAP has issued a security patch for the SAP TREX search engine that addresses multiple vulnerabilities discovered by the experts in a 2015 patch released in December 2015., The SAP TREX search engine is used by many SAP products, including SAP HANA and itsNetWeaver application and integration platform., “SAP, the large...
4647_54619
On Wednesday, hackers belonging to the OurMine group hijacked the Netflix’s US Twitter account (@Netflix)., OurMine took over the Twitter account to promote its website. The incident is very serious, considering that the Netflix US Twitter account has 2.5 million followers. An attacker could compromise the attack to de...
1702_30852
The massive cybar attack that compromised the corporate computer network at Sony Pictures Entertainment is having a serious impact on the organization and its employees. The GOP crew, aka the Guardians of Peace, that hacked Sony Picture accessed a huge quantity of company data, including staff’s PII, internal phone num...
1917_33288
Anonymous ha also posted the manifest of the Op Charlie Hebdo on Pastebin, below the translation of an excerpt from the message:, “It is our responsibility to react … Attacking freedom of speech is a direct hit to democracy. Expect a massive reaction from us, because this freedom is what we’ve been always fighting for....
1654_30363
A group of security and technology experts that fight for the respect of human rights experts have launched a new tool dubbed Detekt that allow the detection of the government surveillance malware on mobile devices and PCs. Amnesty in one the members of the Coalition Against Unlawful Surveillance Exports, the alliance ...
6360_69384
Intel has released microcode to address the CVE-2017-5715 Spectre vulnerability for many of its chips, let’s this time the security updates will not cause further problems., The Spectre attack allows user-mode applications to extract information from other processes running on the same system. It can also be exploited ...
5990_65959
Firefox browser is going to introduce a new security feature to make the users’ experience online more secure, it will warn users if they visit websites that have experienced data breaches., The news was revealed by the Mozilla developer Nihanth Subramany and it was confirmed by the presence of a recently-released GitH...
4826_55969
In January the Israeli mobile phone data extraction company Cellebrite was hacked, the company went in the headlines in the dispute between Apple and the FBI in the case of the San Bernardino shooter’s iPhone., The main product of the company is the Universal Forensic Extraction Device (UFED), an equipment that can rip...
2687_39622
The popular investigator Brian Krebs sustains to know the culprit of the Ashley Madison hack, which publicly leaked 37 million accounts belonging to the users of the adultery website., Brian Krebs disclosed the Twitter account, Deuszu, used by an individual close to the responsible for the Ashley Madison data breach., ...
7391_77815
Personal details of nearly 700,000 American Express (Amex India) India customers were exposed online via an unsecured MongoDB server., The huge trove of data was discovered by Bob Diachenko from cybersecurity firm Hacken, most of the records were encrypted, but 689,272 records were stored in plaintext., The expert loca...
2405_37710
Security experts involved in the investigation on the hack of France’s TV5Monde television channel revealed that behind the pseudonym of ISIS “Cyber Caliphate” there were Russian hackers., “Russian hackers posing as the ISIS “Cyber Caliphate” were likely behind the hack of France’s TV5Monde television channel, accordin...
3978_49170
Ghost Squad Hackers (GSH), a hacktivist group made public the identities of hackers affiliated with the ISIS cyber army called United Cyber Caliphate, including leader Mauritania Attacker., Facebook: pic.twitter.com/h7g4D1gQjd, — s1ege (@s1ege_) 7 luglio 2016, , Prior to this, Ghost Squad Hackers had also gone against ...
2299_36890
, , , Once again thank you!, Pierluigi Paganini, (Security Affairs – Newsletter, SecurityAffairs)
1984_34154
Just a week ago, the media agencies spread the news that US and British intelligence services have stolen encryption keys of the major SIM card maker Gemalto to spy on mobile voice and data communications worldwide., According to The Intercept, the National Security Agency and the British counterpart GCHQ obtained encr...
2029_34625
A critical vulnerability affecting Google Apps for Work allows attackers to send phishing emails. The vulnerability in Google Apps for Work could be exploited to send emails by abusing any website’s domain name and run phishing campaign on the victim’s behalf., Google Apps for Work is a suite of collaborative productiv...
3170_43004
Roaming Tiger is the name of a cyber espionage campaign targeting high profile organizations in Russia and former Soviet Union countries, including Belarus, Kazakhstan, Kyrgyzstan, Tajikistan, Ukraine, and Uzbekistan., The Roaming Tiger campaign was discovered by experts at ESET in 2014, the researcher Anton Cherepanov...
5240_59266
The effects of the militarization of the cyberspace are dangerous and unpredictable. A malicious code developed by a government could create serious problems for the Internet users, the recent WannaCry massive attack demonstrates it that used the EternalBlue Exploit to spread., Now a new ransomware, dubbed UIWIX, was d...
1961_33843
Security researchers at AVG have discovered a new strain of Android malware which is able to spy on mobile users even when their mobile is off., The malware could be used to control victim’s mobile device, the malicious software is able of making calls, sending out SMS and controlling cameras event when the phone is sw...
3840_48062
The best news of the week with Security Affairs.,  , mc4wp_form id=”42321″, , Once again thank you!, Pierluigi Paganini, (Security Affairs – Newsletter, SecurityAffairs)
7220_76615
Here we go again to speak about the notorious Chinese hacking team Pangu, the group is time popular for his ability to jailbreak Apple devices. This time the experts presented a jailbreak for iOS 12 running on the latest iPhone XS., The last jailbreak for Apple iOS devised by the Pangu team was released in October 2015...
4791_55718
The Data breach notification website LeakedSource has apparently been raided by feds. The service is one of the most important available online, it reported some of the largest data breaches last year and now is facing a serious problem., Among the data breaches reported by LeakedSource there are the ones that affected...
2579_38898
Another disconcerting aspect of the Stagefright flaw is that it potentially affects 95% of Android devices running version 2.2 to 5.1 of the Google OS (roughly 950 million smartphones ).  Experts at security firm Zimperium announced the Stagefright vulnerability as the worst Android flaw in the mobile OS history, and c...
5497_61277
The best news of the week with Security Affairs., Hurry up, subscribe to the newsletter, next Sunday you will receive all the news directly in your inbox.I desire to inform you that Security Affairs is now open to sponsored content..I desire to inform you that Security Affairs is now open to sponsored content. I’ll off...
2267_36663
Any abuse of technology against children and youngster can have devastating effects social media them, their lives and their harmony of their families., Social media are among the paradigms that can be transformed to a deadly trap for teenagers, pedophilia, sexting, sextortion and cyberbullying are just a few samples o...
5072_57850
Security experts at MalwareHunterTeam have spotted a new ransomware dubbed ‘rensenWare’. The ransomware is very strange, rather than demanding money, it requires the victims to score “over 0.2 billion” playing “TH12 — Undefined Fantastic Object”., The RensenWare ransomware would scan a machine for certain file types an...
1442_27985
Hosting provider Namecheap announced that earlier this week that hackers compromised some of its users’ accounts, apparently using the “CyberVor” collection of 1.2 billion usernames and passwords compiled by Russian hackers.  “CyberVor” (“vor” means “thief” in Russian) is the name of the Russian criminal gang which col...
531_13037
As expected happened, just yesterday I wrote about a large scale cyber attack against North Korea that blocked internet activities of the country bringing down almost all of all websites, today South Korean authorities are facing with a hacking attack against an Internet provider that brought down the servers of three ...
2919_41336
Scammers are prolific and ingenious guys, this time they are targeting Mac pretending to be operators of the Apple Technical support., Technical support scammers are running aggressive malvertising also relying on legitimate ad networks., “These scams aren’t being done with cold calls, but by aggressive malvertising,” ...
2027_34608
Early 2015 security experts discovered a variant of banking malware dubbed Dridex that was spread through a phishing campaign using Microsoft Excel documents embedding malicious macro to infect victims’ machines., The Dridex malware implements features common to other financial trojans, it uses injection mechanisms to ...
1918_33299
WhatsSpy Public is a web-based tool created by Maikel Zweerink that can trace the moves of a WhatsApp user. WhatsSpy is able to display user information in a friendly dashboard that includes events being displayed in a timeline., , The tool also allows experts to compare timelines of two users in order to conduct cross...
1408_27611
It’s known that the Russian Government is applying a strict surveillance on the Internet within the country, the Kremlin has developed a system code named “SORM-2” to monitor Russian citizens., The Russian Government has obliged national ISPs to purchase and install the probes used by SORM-2 system that allows the Fede...
17_171
English version, Which could be a critical objective to choose if we evaluate media coverage of the event, complexity and effort necessary to the success of the attack, the audience involved, access to resources used in turn for further offenses? Personally, I have many doubts …  a gaming platform!  Yesterday on a nati...
555_13537
One of the most interesting company in security landscape is ReVuln, its researchers specialize in the security assessment and are the authors or various interesting studies on large scale applications and SCADA systems, few weeks ago I presented their work on vulnerability assessment on Gaming platforms., This time I ...
1712_30965
Security experts have detected a new strain of the Destover malware that was used in the recent Sony Pictures Entertainment breaches characterized by a singular feature, the sample is signed by a legitimate certificate stolen from Sony. Destover was detected several times in the last years, one of the most clamorous at...
840_19789
Jeremy Hammond, the popular Anonymous hacktivist considered the principal responsible for the disclosure of thousands of emails from the private intelligence firm Stratfor was sentenced on Friday to 10 years in federal prison., The judge Preska also imposed a further three-year period of probationary supervision once H...
5513_61397
The Italian bank UniCredit admitted a series of security breaches occurred in the last year, personal data of 400,000 loan applicants have been exposed., The Italian bank confirmed that hackers compromised the systems of an unnamed third-party provider for exposing Italian customer data. – including International Bank ...
762_18187
 , An Iranian group of iPhone Geeks managing the blog i-Phone.ir defeated the very basic phenomenon of an iPhone Fingerprinting scanner, which allows them to unlock an iPhone device with multiple Fingerprints.  The news has been provided in exclusive by the colleagues at The Hackers News security portal that were conta...
3591_46117
The security expert David Longenecker reported security vulnerabilities affecting the popular broadband cable SURFboard modems produced by the ARRIS (formerly Motorola). The ARRIS  SB6141 model is available for sale for around $70 US, it is able to support over 150 megabit speeds and works with all almost every US Inte...
3939_48853
The Pawn Storm APT group is once again in the headlines, this time the hackers targeted a significant number of Google accounts belonging to individuals in Russia, former Soviet Union countries, the United States, Europe., Security experts follow a long time the operations of the Russian-linked Pawn Storm cyber spies, ...
927_20953
The NSA is monopolizing the security landscape, The Washington Post reported that the U.S. Intelligence Agency spending a significant effort to develop a computer that could break the majority of encryption algorithms and applications that use them. The intent is to improve the surveillance capabilities of the agency, ...
4471_53180
We discussed several times the rule of the SS7 signaling protocol in mobile communications and how to exploit its flaws to track users., When mobile users travel between countries, their mobile devices connect to the infrastructure of a local operator that communicates with their operator back home. The SS7 protocol al...
1229_25279
On April 8th 2014 Microsoft officially ended the support for Windows XP, but there is still a wide audience of users that are using the oldest Microsoft OS., This portion of users is no more receiving security updates with serious consequences on cyber security perspective. Some organizations are still facing economic ...
4194_50812
Enjoy the interview!, , Could you tell me more about you? Could you tell me which his your technical background and when you started hacking? , I started hacking in 2013, but got better in 2015 when I started the development of 0-day exploits, developing custom programs and scripts, that’s why I use the name “NorthScri...
4232_51131
Malware researchers from security firm Sophos have analyzed a new strain of malware detected as Mal/Miner-C that was designed to abuse resources of the infected machine to mine Monero (XMR) cryptocurrency., The experts discovered that the new malware leverages network-attached storage (NAS) devices as attack vector., T...
1724_31068
Hackers claim to have data about all citizens in Serbia, if the news is confirmed this is another clamorous data breach that could have serious repercussion on the Government., It seems that cyber criminals hacked the Serbian State’s network, accessed to the identities of almost all Serbians, which are now exposed to r...
213_5455
We often discuss about warfare and cyberespionage, focusing on the usage of technology to steal intellectual property of foreign states. Of course the countries that have valuable technology skills are most exposed to targeted attacks that daily try to steal information regarding hi tech projects. Japan, US and Europea...
997_22008
Sochi Olympics are starting, but Intelligence agencies of all participating governments fear the possibility of an terrorist attack or a cyber attack. The event is a great occasion for hackers, hacktivists and cyber criminals which could benefit of the attention of the media to run clamorous cyber attacks., As we have ...
6186_67701
In a report released today, by IOACTIVE, researchers’ advice that critical infrastructure mobile applications are being developed without secure coding compliance that could allow hackers to target Supervisory Control and Data Acquisition Industrial Control Systems., SCADA-ICS stands for Supervisory Control and Data Ac...
7302_77176
VMware has released security updated to fix a critical arbitrary code execution vulnerability (CVE-2018-6974) in the SVGA virtual graphics card used by its ESXi, Workstation, and Fusion solutions., The issue in the VMware products is an out-of-bounds read vulnerability in the SVGA virtual graphics card that could be ex...
6708_72682
Routers manufactured by the Taiwan-based vendor DrayTek are affected by a zero-day vulnerability that could be exploited by attackers to change DNS settings on some of its routers., DrayTek confirmed to be aware that hackers are attempting to exploit the zero-day vulnerability to compromise its routers., Many users rep...
1341_26728
It was October 2010 when the FBI started an investigation on alleged malware-based cyber attacks against on Nasdaq, probably related to the operation of a state-sponsored group of hackers., After more than 12 months in which the FBI has worked with NSA, the US intelligence concluded that a major attack against the Nasg...
899_20626
Security experts at Mandiant intelligence firm have discovered a new intrusion into the network of The Washington Post, it is the third time in the last three years. In time I’m writing it is still not clear the extension of the attack neither an estimation of the losses. Mandiant reported the incident to The Washingto...
5469_61058
The number of cyber attacks against ATM involving so-called ‘insert skimmers’ is increasing. Insert Skimmers are wafer-thin fraud devices designed to fit invisibly inside the ATM card slot., Insert Skimmers are able to capture card data and store it on an embedded flash memory., The popular cyber security expert Brian ...
500_12489
Mobile is probably technology that is having the greatest growth, an increasing number of users execute any kind of application on their devices in mobility. The categories of applications are various, they are used at work and during leisure time and offer any kind of feature of various complexity., These applications...
6891_74132
Siemens is warning of the presence of six vulnerabilities in some of its SICLOCK central plant clocks that used to synchronize time in industrial environments., “In the event of failure or loss of reception from the primary time source, the central plant clock ensures stable continuation of the clock time, and tracking...
4702_55028
Experts from Kaspersky are solving a problem that disabled certificate validation for 400 million users. The problem was spotted by the notorious Google hacker Tavis Ormandy, the vulnerability affects the Kaspersky antivirus software and the way it used certificates to analyze encrypted traffic., The security firm is a...
862_20134
Blackmarket is proposing new exploit kits, like Atrax, that could be used to infect victims with the purpose to steal Bitcoin wallets or to abuse of the computational resources of the victims for Bitcoin mining., Recently security experts at Malwarebytes alerted the security community on the diffusion of Potentially Un...
1426_27793
ICREACH is the name of a Google-like search engine designed by the National Security Agency (NSA) that provides metadata related to individuals living in US to more than two dozen US government agencies., The Intercept has revealed the existence of ICREACH,  a platform used to share data on more than 850 billion commun...
2707_39753
It is becoming even easier to become a cyber-criminal thanks to the model of sale known as malware-as-a-service that offers off-the-shelf malware for rent or sale. Recently malware authors started to offer also Ransomware-as-a-Service (RaaS), in August security experts at McAfee discovered in the Deep Web a ransomware-...
4124_50252
Security experts from the Heimdal security firm have discovered a new DIY financial crime kit offered for sale on a notorious malicious hacker forum on the dark web called Lampeduza., The new crime kit, dubbed Scylex malware kit, allows cyber criminals to roll their own ZeuS-like malware. The malware implements the fea...
483_12195
Today the principal channel for malware diffusion is considered internet, large diffusion of exploit kits and crimeware such as BlackHole, Cool Exploit and Incognito have automated the infection process over the network. Majority of attacks exploits vulnerabilities in large use applications, such as browsers, and the l...
5885_64987
An unnamed man, on his way to the library, spotted a thumb drive on the sidewalk in Queen’s Park, West London. He pocketed the USB drive and continued on his way. He remembered the USB drive a few days later and returned to the library to view its contents. Recognizing the sensitive nature of the information, he then t...
4054_49749
Shad0w Security claimed responsibility for the data breach of the EJBCA – Open Source PKI Certificate Authority., Shad0w Security recently breached into a Switzerland Branch of EJBCA – Open Source PKI Certificate Authority and stole dozens of certificates and credential in clear text., “EJBCA® is a PKI Certificate Auth...
4012_49443
Security experts from Symantec have spotted a new strain of mobile Trojan dubbed Android.Fakebank.B that prevents users from making outgoing calls to banks from their mobile devices., Android.Fakebank.B was first spotted in October 2013, it was able to intercept incoming calls to intercept SMS used by the banks for two...
5832_64403
According to five former employees, hackers broke into the company vulnerabilities and bug reports database, but the news was never disclosed., The former employees explained that Microsoft addressed all the vulnerabilities listed in the compromised database within months so that the vulnerabilities would have limited ...
5023_57429
The DDoS attacks continue to be a profitable business in the cyber criminal underground. Powering a DDoS attack against an organization is even cheaper, running an attack can cost as little as $7 an hour, while a targeted DDoS against a company can cost up to thousands or millions of dollars., , Kaspersky Lab has publi...
6185_67683
Drones have created a new threat to people’s privacy. Anyone with a drone equipped with a video camera can potentially violate our privacy by streaming the subject in his/her private space over an encrypted first person view (FPV) channel., Experts suggested many methods to detect nearby drones, but they all suffer fro...
5568_61850
The FBI has used once again the network investigative technique (NIT) for unmasking Tor users, this time the feds used it to arrest a suspected sextortionist. The man is accused of having tricked young girls into sharing nude pics of themselves and then blackmailed them., The network investigative technique (NIT) was u...
7096_75710
Security firm SecureWorks has uncovered a new phishing campaign carried out by COBALT DICKENS APT targeting universities worldwide, it involved sixteen domains hosting more than 300 spoofed websites for 76 universities in 14 countries, including Australia, Canada, China, Israel, Japan, Switzerland, Turkey, the United K...
3803_47756
When speaking with someone new to ISO 27001, very often I encounter the same problem: this person thinks the standard will describe in detail everything they need to do – for example, how often they will need to perform backup, how distant their disaster recovery site should be, or even worse, which kind of technology ...
7011_75033
Attackers carried out a spear-phishing campaign against entities in the industrial sector, the messages disguised as commercial offers where used by attackers to deliver a legitimate remote administration software on victims’ systems (TeamViewer or Remote Manipulator System/Remote Utilities (RMS))., Attackers personali...
2387_37569
The popular mobile messaging app WhatsApp is vulnerable to hijacking exposing hundreds of Millions of users vulnerable to attack. It could be quite easy to take over a WhatsApp account when the attacker has the phone number of the victim., even if it is locked, The attack also works in case the mobile device is locked,...
1144_24094
The Ponemon Institute published a new study titled “The SQL Injection Threat Study“ to understand the reply of organizations to the SQL injection threat., The study is sponsored by DB Networks, its Chairman and CEO Brett Helm used the following words to describe the inpact of the SQL injection attacks:, “It’s well know...
686_16721
The Turkish authorities diffused the news of a cyber attack against the Istanbul Ataturk International Airport. Official sources revealed that the passport control system at the departure terminal of the Istanbul Ataturk Airport International was hit by a cyber attack last Friday, but concerning news is that also anoth...
182_4560
Today I desire to share with you the results of a study of Trend Micro security firm focused on mobile threat incidents related to the first quarter of 2012. The large diffusion of mobile devices and the leak of awareness on the principal cyber threats have produced an increasing interest of the cybercrimein mobility s...
2413_37750
Apple is revealing a series of improvement for its new iOS 9, today we have discussed the content blocker announced by Apple, and the company now announced new measures to improve the security of its devices., The iOS9 will substitute the 4-digit passcodes to 6-digit passcodes increasing the number of possible combinat...
5589_62021
The security researcher David Montenegro discovered a new exploit kit dubbed Disdain that is offered for rent on underground hacking forums by a malware developer using the pseudonym of Cehceny., Disdain Exploit Kit – New Exploit Kit up for sale in Underground Forum – Copy && Paste .. ?.. Beps Exploit Kit .. ?.. $./I_l...
1266_25735
Zeus malware never dies, it seems the title of a film, but the reality goes over the fiction, despite the recent success of law enforcement agencies in the takeover of Gameover Zeus and the recent proposal of  a written-from-scratch trojan being sold in the underground known as Pandemiya., Zeus malware is a versatile a...
3070_42328
According to the Guardian, the former British defence secretary Des Browne called on the British Prime Minister to assess the resilience to cyber attacks of the Trident nuclear weapons system., “The UK Trident programme encompasses the development, procurement and operation of the current generation of British nuclear ...
4282_51560
Today I wrote about the imminent announce of the Yahoo data breach related to an incident that resulted in the leakage of 200 million Yahoo account credentials this summer., The company has finally made the announce, the news related the Yahoo data breach is in the headlines. The IT giant confirmed that hackers have st...
2870_40957
I desire to inform you that Security Affairs is now open to sponsored content. I’ll offer the opportunity to: •    Insert banners of various sizes in all the posts on Security Affairs. •    Publish sponsored posts written by the customers that can include any kind of commercial reference. •    Arrange a monthly/quarter...
3454_45039
The researcher Nils Rodday presented at the annual RSA conference in San Francisco the findings of its study on hacking drones., Rodday, who currently at IBM, has conducted his research while working as a graduate researcher at the University of Twente in the Netherlands., Rodday focused its research on remote hijackin...
2292_36843
A unique targeted attack being underway for about two consecutive years exploits Windows file functions that look legitimate and a couple of homemade scripts – but not malware – in order to infiltrate firm in the gas & oil maritime transportation sector., The attack was initially discovered by Panda Labs’ security rese...
6202_67865
RubyMiner, was first spotted last week when a massive campaign targeted web servers worldwide, most of them in the United States, Germany, United Kingdom, Norway, and Sweden., The experts believe that a single lone attacker is behind the attacks, in just one day he attempted to compromise nearly one-third of networks g...