A joint effort of law enforcement agencies the US and EU and with the support of private cybersecurity firm aims to disrupt the activities of the Dridex botnet. Dridex malware is known to be the successor of another malware like Cridex, Feodo, Bugat, etc etc, and uses many techniques with the purpose of stealing users, […]
The NCA has uncovered a series of cyber attacks based on a new strain of the Dridex banking trojan that allowed crooks to steal ÂŁ20m in the UK alone. The UK’s National Crime Agency is investigating on cyber attacks on British bank accounts that allowed the criminals to steal ÂŁ20m from the victims. The attackers have […]
Two researchers from the French Intelligence Agency ANSSI discovered that hackers can control a mobile device remotely using the personal voice assistant. A team of experts from French Intelligence Agency ANSSI has discovered that a hacker can completely control mobile devices from as far as 16 feet away. How is it possible? The hackers have discovered a […]
The Chinese jailbreaking team Pangu has just released a software (iOS 9 jailbreak) that allows Apple users to jailbreak their mobile devices using  iOS 9. Every time a new release of the popular Apple iOS is presented, hackers and experts start the competition to jailbreak it. One of the most active hacking crew in this […]
Google listens and records our voice searches, but the majority of the users ignores it. I’ll explain how to listen and delete them from your account. Google knows everything of our digital existence and the story that I’m going to tell you confirm it. The fact that Google keeps track of our researchers is not […]
FireEye has uncovered a new hacking group dubbed FIN5 hacked payment systems of an un-named Casino and it has stolen nearly 150,000 credit cards. The fact that the game can create problems is not a novelty, news of the day is that an un-named Casino has lost 150,000 credit cards. The cause of the data […]
Check Point discovered a series of malware-based attacks on Israeli public sector organizations that were infected by the Zeus Trojan via RTF files. Security experts at Check Point have detected a series of attacks on high-profile companies, victims were targeted by a malicious spam campaign that relies on bogus RTF file. The campaign targeted several individuals […]
Americaâs Thrift Stores announced on Friday that payment information of a part of its customers might have been stolen by hackers which used a PoS malware. Americaâs Thrift Stores has announced in an official statement that it has suffered a malware-based attack that caused a data breach. According to the company, the threat actors are […]
Researchers at Trend Micro have issued a new report on the Japanese Cybercrime Underground, a growing criminal community with his characteristics. Cybercrime underground is a growing and prolific industry that knows no crisis as demonstrated by the numerous reports issued by principal security companies and law enforcement. In the past we have analyzed criminal most […]
The CENTRAL MEANS OF PAYMENT ANTIFRAUD OFFICE (UCAMP) of the Italian Ministry of Economy and Finance released the annual report on Payment card frauds. This year I’m among the experts who worked on the MEF – Annual Report on Payment Card Frauds No. 5/2015, it has been an honor and a pleasure to be able […]