A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Google To Speed Up The Internet With Its New QUIC Protocol APT28 Russian hackers exploited two zero-day flaws in the wild Security Affairs newsletter Round 5 – Best of […]
Security experts have conducted an experimental to analyze cyber security threats against teleoperated surgical robots in telesurgery. Technology will help humans to overwhelm any obstacle, one of them is the concept of space that for some activities could represent a serious problem. Let’s think for example to a life-saving surgery that could be performed by surgeons that […]
The Dark Web email service SIGAINT suffered a major attack that involved 70 exit nodes, a circumstance that suggests Government operation. Law enforcement and Intelligence agencies are always involved in the infiltration of Darknets and related services with the primary intent to monitor bad actors and de-anonymize users. The Tor-Based Dark Web Email Service SIGAINT is one […]
How many infected Point-of-Sale terminals are infected worldwide and how is evolving the cyber threat? Here you are the opinion of the expert. Security experts at IntelCrawler threat intelligence firm are among the team of researchers more active against Point-of-Sale (PoS) malware. IntelCrawler The team conducted several investigations in the past and continuously monitor the evolution of […]
According new revelations published by the Der Spiegel the German intelligence agency BND helped NSA in monitoring European politicians. We discussed several times of the aggressive cyber espionage campaigns run by the US intelligence and its allies of Five Eyes (Canada, UK, New Zeland, Australia and, of course, the US). The Intelligence targeted private companies and entities worldwide in order to establish a dominance in the cyberspace. […]
Which is the impact of the Windows XP End of Life on the critical infrastructure? Recently a Government audit found 48,000 XP PCs still running at TEPCO. One year ago the end of life for Microsoft Windows XP raised a heated debate on security for all the infrastructure that still adopt the popular OS. Windows XP […]
The drop in the value of the Bitcoin is pushing cyber criminals to rapidly cash-out their ears with ransomware in order to monetize their efforts. The business made by exploiting Ransomware has seen better days, all because the value of Bitcoin is dropping, that means, to avoid losing more money crooks are laundering money. “They( criminals) […]
Security experts at Trend Micro have discovered Phasebot malware, which also has fileless infection as part of its routine, is being sold online. Phasebot is a strain of malware characterized by fileless infection that is being sold in the criminal underground. In August 2014, experts at GData discovered Poweliks, a persistent malware able to infect machines without installing […]
Kaspersky Lab discovered another APT group dubbed CozyDuke which is believed to have hacked the US Department of State and the White House. Experts at Kaspersky Lab have uncovered a new advanced persistent threat (APT) dubbed CozyDuke that targeted several high-profile organizations in the second half of 2014. Kaspersky experts have published an interesting blog post that includes […]
At RSA conference 2015 a researcher demonstrated that Avaya’s Ethernet office phones can be compromised with just a simple text editor. At the RSA conference 2015 in San Francisco, Dr Ang Cui from Columbia University PhD and Red Ballon Security cofounder announced that Avaya’s Ethernet office phones can be compromised with just a simple text […]