Researchers have been monitoring a campaign dubbed Magecart that compromised many ecommerce websites to steal payment card and other sensitive data. Researchers have been monitoring a campaign in which cybercriminals compromised many e-commerce websites in an effort to steal payment card and other sensitive information provided by their customers. Security experts from cloud-based security solutions provider […]
The author of the FastPoS PoS malware issued an update that profoundly changes its behavior, preferring a quick exfiltration activity even if is noisier. Christmas is approaching, and the experts are already at work, including the authors of PoS malware that at that time maximize their profits. The criminal group behind the FastPoS PoS malware have updated […]
Mac malware could spy on users by piggybacking on webcam sessions started by legitimate applications such as FaceTime, Skype and Google Hangouts. Security experts are worried about the presence of a new Mac malware in the wild that attempt to record video via the built-in webcam. The principal problem for this family of spyware is […]
Which are principal cities hostages of malicious botnets? Symantec has tried to reply the difficult questions with an interesting study. It is not a mystery, there is a strict link between cybercrime and Geography. Cyber criminal organization used different tactics and offer different products depending on the country where they operate. Russian criminal communities specialize in […]
A few hours after the Reuters reported the existence of a surveillance tools used by Yahoo for email massive scanning, the Tech giant denied it. This week the Reuters reported Yahoo reportedly scanned all of its users’ incoming emails with a secret software program that is designed to gather information for the US Government agencies. According to […]
A new variant of the Cerber ransomware kills common database-related processes like those of the MySQL, Oracle and Microsoft SQL servers to encrypt files. According to experts the BleepingComputer.com forum, a new variant of the Cerber ransomware is the wild attempts to shut down database connections to increase the effects of the infection. The principal goal […]
Once again an NSA contractor is the headlines for the alleged theft of secret exploit codes and highly confidential documents. The FBI has arrested another NSA contractor over a massive secret data theft. The US DoJ has charged Harold Thomas Martin (51) with theft of secret documents and highly classified government material. According to a court […]
The WiFox mobile app was designed as a huge container of network names and passwords for Wi-Fi airports networks worldwide. Do you travel a lot? Probably you have already read about WiFox, it is a legitimate Android/iOS mobile app that includes indications of thousands of airport Wi-Fi networks and their passwords. We have spoken several times about the […]
Hackers could use Insulin Pumps as weapons, this is not a sci-fi movie, but a disconcerting reality. The OneTouch Ping insulin pumps manufactured by Animas, a company owned by Johnson & Johnson, are affected by multiple several vulnerabilities that can be exploited by remote hackers to harm the diabetic patients who use them. While the security […]
Yahoo may have allowed US government to search user emails by using a secret software program that scanned hundreds of millions of Mail accounts. Yahoo is still in trouble, this time the company has reportedly scanned all of its users’ incoming emails with a secret software program that is designed to gather information for the US Government […]