Some Uber trip information is publicly accessible through simple Google queries, the set includes trip and user info, and home and work addresses. Rapid diffusion of technology makes easy phenomena of accidental data leakage, the last one is related to the popular car service Uber. Dozens of trips of Uber customers have been cached by […]
Barclays has created a red team to hack its own computer systems to discover and exploit security vulnerabilities before external attacker do. For someone working in the security area, it’s known that many companies have red teams to attack their own system, but this information is never recognized by the company. Barclays did exactly the […]
Malwarebytes has uncovered a new malvertising campaign targeting the Match.com ‘s ad network which has been breached by a malware campaign. Are you a UK single looking for love and passion? Be aware another threat is menacing dating communities, this time the popular dating web site Match.com and its  5.5 million British users suffered a […]
A new variant of Android ransomware relies on the instant messaging protocol XMPP to establish a communication with C&C servers. According to security researchers at Check Point Software Technologies a new Android ransomware disguised as a video player app implements a method of communication different from any other similar threat. This Android ransomware is different from […]
Security researchers at MalwareBytes have discovered a new variant of an adware installer that is leveraging an old trick to access the Keychain on MAC OS X In July, researchers at Malwarebytes have identified a local privilege escalation (LPE) vulnerability in the Mac OS X operating system. The experts discovered that the flaw in OS X was […]
Dark Web Intelligence could help law enforcement and intelligence agencies to gather information on potential attacks. Which are the risks? The increased number of cyber attacks against government entities and the hypothesis that the U.S. government should take an offensive strike against hackers who hit the countries raised the discussion on the problem of the attribution. Prevention, mitigation and […]
Veracode has conducted a research on the security of several mobile gambling apps and discovered a number of flaws that expose enterprises to serious risks. If you belong to a global corporation, the most probably think you will find out is that some of your colleagues have installed mobile apps that donât belong to the […]
Security researchers from Rapid7 security firm discovered a number of security vulnerabilities affecting several Video Baby Monitors. Researchers find major security flaws in popular networked video baby monitor products that could allow attackers to snoop on babies and businesses. Rapid7Â analyzed baby monitors from six vendors, ranging in price from $55 to $260 in order to […]
Security experts at G-Data security firm have discovered new cases of Chinese Android mobile devices infected by pre-installed malware. Security researchers from G DATA have discovered more than two dozen Android mobile phones from different manufacturers already infected by pre-installed malware. The kits analyzed by the company are commercialized by many manufacturers including Huawei, Lenovo […]
The Shifu Banking Trojan is a new sophisticated malware that has been used to target the customers of more than a dozen Japanese banks. Shifu is the name of a new banking trojan that has been around since at least April targeting Japanese banks and a number of European e-banking platforms. “Shifu currently targets 14 […]