Security experts from Cheetah Mobile Security Research Lab published an interesting Technical analysis of the mobile variant of the Locker virus. Blatant malicious behavior of the Locker virus The Locker virus can easily be identified by its blatant malicious behavior. Here are the tell-tail signs: Windows appear on the top of the home screen that […]
WikiLeaks confirmed that the email publication server suffered a massive DDoS attack since it published a new set of DNC hacked emails dubbed as DNCLeak2. A couple of days before the 2016 Presidential election, WikiLeaks has published a new set of emails hacked from the Democratic National Committee (DNC). The new set, dubbed DNCLeak2, includes 8,200 emails, the […]
The Russian Government has asked Washington to provide clarifications on reports that the US cyber army has hacked into Russia’s critical infrastructure and is ready to strike back in case of interference on 2016 Presidential Election. The US Presidential election is very close and the US Government doesn’t want any interference from foreign government. Across the […]
Tesco Bank halted all online transactions after a cyber heist affected thousands of its customers. An investigation is ongoing. Tesco Bank is going to adopt a strong measure in response to a cyber attack, the financial institution will freeze customers’ online transactions. The measure was announced by the chief executive Benny Higgins, the bank has admitted […]
Cisco data leak – Cisco has fixed a security vulnerability in the company Professional Careers portal that exposed personal information of the users. Cisco data leak – Cisco has fixed a security vulnerability existing in the company Professional Careers portal that may have leaked personal information. Cisco has notified the issue to the affected users […]
Enterprises running Exchange Server using two-factor authentication on Outlook Web Access (OWA) could be hacked due to a design flaw. New troubles for enterprises running Exchange Server, two-factor authentication implementations on Outlook Web Access (OWA) could be easily bypassed due to a design flaw. An attacker can bypass two-factor authentication to access email inboxes, calendars, contacts and […]
The databases of the Indian Embassies in Switzerland, Mali, Romania, Italy, Malawi, and Libya were leaked online by two grey hat hackers. Today I was contacted by a security pentester who goes online with the moniker Kapustkiy who revealed me to have breached the Indian Embassies in Switzerland, Mali, Romania, Italy, Malawi, and Libya. Kapustkiy and his friend Kasimierz (@Kasimierz_) told […]
Belkin’s WeMo home automation firmware that’s in use in several IoT devices has recently been found vulnerable to an SQL injection. Belkin’s WeMo home automation firmware that’s in use in its light bulbs, switches, security cameras, coffee makers and room heaters has recently been found vulnerable to an SQL injection. The hack allows root privileges […]
Experts from Heimdal Security reported a recent LinkedIn phishing campaign aiming to collect confidential information from unsuspecting users. Phishing attacks continue to be a serious threat, crooks exploit paradigms such as social medial platforms and mobile in the attempt of stealing sensitive data.According to 2015 Verizon Data Breach Investigation Report, 23% of email recipients open […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all, let me inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html THANK YOU! AV-TEST study sees search engine results even more poisoned with malicious links LDAP as attack […]