Security experts at Palo Alto Networks have uncovered a new strain of malware dubbed BackStab that steals local mobile data backups. Security experts at Palo Alto Networks have uncovered a new strain of malware dubbed BackStab that steals local mobile data backups and transfer it to the C&C server. The malware is not able to […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Vtech hacked, data of thousands of kids exposed Russia deploys jamming systems in Syria as tensions rise Turris Omnia Security Project protects home network users Microsoft takes PUPs behind […]
Another vulnerable IoT device is in the headlines, this time two serious vulnerabilities affect the Honeywell Midas gas detectors. Honeywell has just released firmware updates for its Midas gas detectors to fix two high severity vulnerabilities. The Midas gas detectors are a category of product manufactured by Honeywell to detect toxic, ambient and flammable gasses in the […]
In response to the recent Paris terror attacks, the French government is proposing to forbid and block the use of the Tor anonymity network. In response to the recent Paris terror attacks, the French government is proposing to forbid and block the use of the Tor anonymity network. According to an internal document from the Ministry of […]
Ghost Security Group has reportedly discovered an Android mobile application used by members of the ISIS organization for secure communications. According to the Christian Science Monitor, the Ghost Security Group has reportedly discovered an Android mobile app used by members of the ISIS organization. The Ghost Security Group is the notorious group of cyber experts in counter-terrorism networks that is […]
Bad news for PC users, Lenovo machines can be hijacked by visiting a malicious website, meanwhile Dell and Toshiba PC are affected by serious flaws. Security Researcher slipstream/RoL posted Proof-of-concept exploits online (3 OEMs Vulnerable To Three Vulnerability Your PCs At Risk) demonstrating how to compromise machines available on the market. Three OEMs. Three applications preinstalled. Three exploits. […]
A European Parliament report has warned that the ISIS organization has already smuggled CBRN material into the EU, the risk of WMD attacks is real. Intelligence experts suspect that the ISIS has recruited experts with chemistry, physics and computer science degrees to wage attacks with weapons of mass destruction. “ISIS actually has already acquired the […]
According to a new report published by the Kaspersky Lab, the Sofacy APT has recently increased its activities. According to a new report published by the Kaspersky Lab, the Advanced persistent threat group Sofacy (also known as APT28 , Fancy Bear, Sednit, and STRONTIUM) has increased its activity. The Sofacy group has been active since 2008, targeting mostly military […]
Learn more about the EFF scoreboard for secure, encrypted communication options online and what the future holds. Online communications have been increasing rapidly over the past few years. However, there are many incidents revealing Internet surveillance. If you think of Edward Snowden and the revelations that he had brought to the public about NSA and […]
A criminal named Hacker Buba after asking UAE bank for $3 million ransom started leaking customer data online. Last week a hacker, who named itself as ‘Hacker Buba,’ breached a United Arab Emirates Bank, then he start tweeting customersâ information announcing the disclosure of tens of thousands of customer files online if a $3 million […]