A critical flaw affecting Google Apps for Work allows hackers to run malicious phishing campaigns by abusing any websiteâs domain name. A critical vulnerability affecting Google Apps for Work allows attackers to send phishing emails. The vulnerability in Google Apps for Work could be exploited to send emails by abusing any websiteâs domain name and run phishing campaign on the […]
Experts at Trustwave have discovered a spam campaign composed of several hundred messages trying to serve Dridex trojan though xml documents. Early 2015 security experts discovered a variant of banking malware dubbed Dridex that was spread through a phishing campaign using Microsoft Excel documents embedding malicious macro to infect victims’ machines. The Dridex malware implements features […]
Security firm Digital Shadows has realized a search engine for the Deep Web that according the company CEO “sucks in pages in real time”. The deep web is the part of the world wide web not indexed by common search engines, it represents almost all of the content available on the Internet. Law enforcement, intelligence […]
A new collection of documents leaked by Edward Snowden shines light on shadowy New Zealand surveillance activities operated at the Waihopai Base. A new collection of documents leaked by Edward Snowden provides an interesting analysis of the relationship between the Five Eyes countries and the surveillance activities they managed. The documents published Saturday by the […]
The security firm Bluebox discovered a preinstalled malware, many malicious apps, and a series of security holes on the Xiaomi Mi 4 smartphone. After the episode of Lenovo pre-installed malware, another case is worrying the IT community. This time, security firm Bluebox has discovered pre-installed malware and other security issues with a Xiaomi Mi 4 mobile […]
A group of researchers from TrapX Security demonstrated how to infiltrate home networks by compromising a Nest thermostat. We already discussed in the past of the risks related to cyber attacks against IoT devices, these smart objects are everywhere, including our homes, so they represent a privileged target for hackers. Security experts from TrapX Security demonstrated how […]
British NCA has arrested a 23-year-old man suspected to be a member of the hacking crew that run the attack on the US Department of Defense in the 2014. British law enforcement has identified and arrested a 23-year-old man over a hacking attack on the US Department of Defense on June 15, 2014. The law […]
Researchers hack NSAâs website with only $104 and 8 hours of Amazonâs cloud computing power using the #FREAK vulnerability A team of researchers demonstrated that it is possible to exploit the FREAK vulnerability to hack the official NSA website by using 8 hours of Amazonâs cloud computing power and spending only $104. The researcher made […]
Internet users that have recently installed or updated the popular BitTorrent client ÎŒTorrent 3.4.2 Build 28913 may have installed a Bitcoin miner. Internet users that have recently installed or updated the popular BitTorrent client ÎŒTorrent 3.4.2 Build 28913 had a nasty surprise, the application, in fact, installed a Bitcoin miner as explained in this advisory. “Users […]
Kaspersky Lab experts carried out a study of the principal threats for children encountered in 2014 by users of the Parental Control module. The Internet is a dangerous place for Children, almost every teenager is always online through desktop PC and mobile device, resulting exposed to dangerous threats. The dangers are not negligible for children […]