Bloomberg states that the ongoing investigation conducted by US authorities was probing allegations that there is a Russian gang behind the Dow Jones hack. Dow Jones has provided further information on the data breach that the company has recently suffered. A week ago, the CEO of Dow Jones & Co disclosed the incident confirming that 3,500 […]
A flaw affecting the way encryption software implements the Diffie-Hellman key exchange algorithm allowed the NSA to break trillions of encrypted connections. Edward Snowden has revealed to the world that the NSA was able to crack also the almost encryption to conduct a large-scale online surveillance. According to Snowden, the intelligence Agency was able to decrypt […]
Cyber Terrorism, The Justice Department has charged a hacker in Malaysia with stealing the personal data of US service members and passing it to the IS group. For the first time ever the US Justice Department has charged a suspect for terrorism and hacking, the two practices converge in the concept of cyber terrorismcyber terrorism. The […]
DroneDefender is a weapon specifically designed to target drones at a range of just 400 meters with radio waves forcing them to safe mode. While the number of drones in the sky is increasing exponentially, the US company Battelle has developed a shoulder-mounted rifle to could be used to target and knock unwanted drones flying […]
Researchers probed 20,400 Android devices and found 87.7 per cent contained at least one exploitable vulnerability due to a slow patch management. New Android vulnerabilities are discovered every day, but it looks like that, some Android vendors are very slow in applying the necessary patch to fix the security issues. Some Android vendors are only […]
McAfee Labs has analyzed a number of websites and services in the Dark Web used by the criminal communities for the commercialization of stolen data. You know my passion for the Dark Web, I spend a lot of time monitoring activities in the hidden part of the web with a particular interest in illegal activities that […]
Despite both Microsoft and Adobe releasing patches on Tuesday (10/13/2015), a critical Flash zero-day flaw remains unpatched in Adobeâs latest update. Despite both Microsoft and Adobe releasing critical patches on Tuesday (10/13/2015), a critical zero-day vulnerability remains unpatched in Adobeâs latest update. As per Adobe APSA15-05, this vulnerability (CVE-2015-7645) remains unpatched is actively being exploited in-the-wild. Adobe plans […]
Researchers at ESET have spotted a new strain of banking Trojan dubbed Brolux that is targeting online banking users in Japan. Once again customers of the Japanese banks have been targeted by a malware, after the recent campaigns based on Shifu, Tsukuba, and Neverquest, now its time for a new threat. According to the security firm ESET […]
Microsoft has released the month’s Microsoft Patch Tuesday that has fixed 33 vulnerabilities, most of them critical and affecting Internet Explorer. Here we are to discuss the last month’s Microsoft Patch Tuesday that this month fixed for 33 vulnerabilities, most of them affecting Internet Explorer. The experts warned that that many of the vulnerabilities are critical and […]
5 Guidelines in Battling Cyber Criminals Over Precious Business Data, lets’s try to understand how to Ensure Enterprise Security. You would think that a company that stores their clientsâ money and handles investments would have tight security measures on their system against cyber attacks. Apparently, this is not always the case. In 2014, Scottrade, a […]