More than 10,000 WordPress installations being exploited in the wild due to a vulnerability in the  WP Mobile Detector plugin. Security experts at Sucuri reported that a growing number of WordPress installations have been compromised by hackers exploiting a security flaw in a widely used plugin called WP Mobile Detector. The worrisome news is that […]
Experts at FireEye spotted IRONGATE a mysterious strain of malware that appears to be designed to target industrial control systems (ICS). Security researchers at FireEye have spotted a new strain of malware IRONGATE has been designed to compromise industrial control systems (ICS). The malicious code was designed to manipulate a specific industrial process in a simulated Siemens control […]
Many TeamViewer users reported that their systems were accessed by hackers via the popular support tool, but the company denies any incident. Many TeamViewer users reported that their systems were accessed by hackers via the popular support tool, but the company denies any security breach. First claims appeared on Reddit, several users reported that unauthorized parties remotely accessed […]
The Tor Project released the Tor Browser 6.0, the last version of the popular Tor browser that brings along significant privacy and security improvements. Early this week the Tor Project released the new version of the Tor Browser, the Tor Browser 6.0 which is based on Firefox ESR 45. The new version of the popular […]
The Analysis of SWIFT attacks revealed five additional pieces of malware containing portions of code shared by Lazarus Group. While security experts continue to investigate the cyber heists that involved SWIFT systems, new evidence collected by a senior security researcher from Anomali Labs link the malware to the North Korean hacker crew known as Lazarus Group. The expert discovered that five […]
A study of Duo Security revealed that Lenovo Accelerator Application support tool contains a high-risk flaw that allows remote code execution. Once again bad news for Lenovo users, the company is informing them that the Lenovo Accelerator Application contains a high-risk vulnerability that could be exploited by hackers to remotely execute code on the machine and […]
There is very little doubt in the mind of many that Snowden has caused irreparable damage to the U.S. espionage program. Was Snowden right in his actions? Recently, former U.S. Attorney General Eric Holder praised Edward Snowden for performing a âpublic serviceâ by bringing forward the debate over the governmentâs role in domestic surveillance. The […]
From today, Global Intelligence Insight, working with SecurityAffairs and SecurityMediaPublishing will deliver a weekly report on issues in Syria and Iraq as well as extremist related global terrorism. Data comes not just from open sources but also from material not readily available and is gathered by intelligence professionals using specialist tactics techniques and procedures in […]
The researchers from the Trustwave’s Spiderlabs team discovered that a Windows zero-day is available for sale in a popular crime forum for $90,000. A Windows zero-day flaw was offered for sale at US$90,000 on the Russian crime forum exploit.in. The flaw could be exploited by hackers to gain a full deep access to an already compromised […]
The infographic created by experts at Norwich University highlights deep web crime and identity theft by providing astonishing statistics. A recent survey conducted by the U.S. government found that over half of all American internet users have cut back on their online activity due to cyber security concerns. In particular, many of these concerns related […]