Researchers at MalwareBytes have spotted a new Android Malware dubbed Pawost that uses Google Talk to make unwanted phone calls. Security experts from MalwareBytes have spotted a new strain of Android malware, dubbed Android/Trojan.Pawost, that implements an unusual feature. The Pawost threat originates from China and is able to use Google Talk to make malicious phone […]
Conficker (also known as Downup, Downadup e Kido) is one of the oldest and still active malware, according to Check Point researchers it is “the most prominent family accounting for 14 percent of recognized attacks.” Conficker is technically a worm that leverages a vulnerability in the Windows Server Service to spread itself, it targets an […]
A coalition of tech groups asked the Congress to roll back changes to Rule 41 that allowed law enforcement to do mass hacking. Congress should block the changes to the rules for the regulation of US law enforcement investigations. The rules allow law enforcement agencies hacking in computers worldwide for its investigation. In April, the […]
The exploit kit landscape is rapidly changing,the Angler and Nuclear EK disappeared and overall malicious traffic drops by 96% since April. As highlighted by security experts the threat landscape is in continuous evolution, despite the criminal underground was monopolized by Angler and Nuclear exploit kits for several years other EKs represent a serious threat to online […]
A Chinese security researcher has discovered a Windows design flaw dubbed BadTunnel that affects all versions of Windows. The Chinese researcher Yang Yu, director of Xuanwu Lab of Tencent has discovered a design flaw in Microsoft Windows that affects all versions of the popular operating system. The vulnerability could allow an attacker to hijack a target organization’s […]
Apple issued a security update to fix a nine-month-old DNS parsing flaw affecting Apple AirPort routers but avoided providing further info on the issue. Apple has issued a security update to fix a nine-month-old DNS parsing vulnerability affecting its AirPort routers. Apple has released a firmware update 7.6.7 and 7.7.7 that runs on AirPort Express, AirPort Extreme and […]
The Taiwanese electronics company Acer informed its customers that some of their sensitive financial data may have been accessed by hackers. The Taiwanese IT giant Acer recently confirmed to California’s Attorney General (AG) that unknown hackers compromised its online store and accessed customers’ sensitive data. The leaked data includes credit card numbers, expiry dates, CVC security […]
Earlier June the Tor Project announced a hardened version of the popular Tor Browser that implements a feature dubbed Selfrando to defeat exploits. Early June the Tor Project announced a hardened version of the popular Tor Browser, the Tor Browser 6.5a1-hardened. “A new hardened Tor Browser release is available. It can be found in the 6.5a1-hardened […]
David Dworken is the name of the student that hacked into the Pentagon US military’s website between classes at Maret High School and that the Government thanked. Recently we have reported the first results of the “Hack the Pentagon” program that allowed the discovery of numerous flaws in the computers of the US Government. News […]
An unnamed hacker hacked the video conferencing software used by the Quebec Liberal Party and shared the news with the media. Politicians are a privileged target of hackers, in many cases they totally ignore the risk of a cyber attack and their staff is not aware of ongoing espionage activities. We read about hackers that […]