Coder in the Brazilian Cyber Criminal underground are Pioneering Cross-platform malware relying on Java archive (JAR) Files. Recently security experts at PaloAlto Networks uncovered a new family of ransomware dubbed KeRanger that targets Mac OS X users, a circumstance that demonstrates that every OS is potentially at risk. Now researchers at Kaspersky Lab have discovered new families […]
The South Korean NIS revealed that North Korea had hacked into smartphones belonging to a number of key government officials. The South Korean National Intelligence Service (NIS) revealed that North Korea had hacked into smartphones belonging to a number of key government officials. The announcement was made on Tuesday, according to the NIS cyber spies from  North […]
How VPN (virtual private networks) are being utilized for stimulation, legislative issues, and correspondence in various nations. As information security guru Bruce Schneier and his Berkman Center for Internet and Society associates brought up in a report a week ago, there are currently around 865 encryption-related items accessible all around the globe. From voice encryption […]
A number of bypass vulnerabilities still affect iOS devices and could be exploited by an attacker to bypass the passcode authorization screen. A number of bypass vulnerabilities still affect iOS devices and could be exploited by an attacker to bypass the passcode authorization screen on Apple mobile devices (iPhones and iPads) running iOS 9.0, 9.1, and […]
A security researcher has discovered a Facebook password reset vulnerability that allowed him to brute force into any FB account. The security researcher Anand Prakash has discovered a password reset vulnerability affecting Facebook. The critical vulnerability could be exploited by attackers to hack into any FB account launching a brute force attack. “This post is about a simple vulnerability […]
The sounds of a 3D printer at work can be analyzed by researchers to reconstruct the original 3D model used to create the object. It isn’t a sci-fi movie but a true experiment conducted by the researchers at the University of California Irvine, led by Mohammad Al Faruque, that demonstrated how to steal 3D-Printed models by copying sounds of […]
w-2-phishing – Scammers tricked an employee at data storage firm Seagate Technology into giving away W-2 tax documents on all current and past employees. According to a new sensation case revealed by the popular security expert Brian Krebs, cyber criminals last week tricked an employee at data storage company Seagate Technology into giving away W-2 tax documents on all current and […]
Over the weekend Apple customers who were looking for the latest version of Transmission were infected by KeRanger MAC OS X ransomware. Bad news for Apple customers, their systems were targeted for the first time over the weekend by a ransomware campaign. The experts at Palo Alto Networks Unit 42 who discovered the malicious campaign reported that Apple […]
TrendMicro published an interesting analysis of the principal cyber criminal underground communities in the Deep Web worldwide. A new interesting report published by the experts at TrendMicro highlights the differences between the principal underground ecosystems worldwide. Thinking of a unique “global” underground ecosystem is an error, every community has its own characteristics, the criminal crews that […]
ProofPoint uncovered a new cyber espionage campaign dubbed Operation Transparent Tribe targeting Indian diplomatic and military entities. A new cyber espionage campaign dubbed Operation Transparent Tribe is targeting diplomats and military personnel in India. The researchers at Proofpoint who have uncovered the hacking campaign confirmed that threat actors used a number of hacking techniques to hit the […]