Facebook developed an astonishing algorithm for facial recognition considered as the latest Artificial Intelligence step, it’s name is PIPER. Artificial Intelligence has been playing an important role to offer better and outstanding features in applications and a lot of computer giants and agencies have spent huge amount of money to acquire more and more. Facebook […]
Security experts at Kaspersky collected evidence that the Winniti APT is moving beyond the gaming industry targeting telecoms and big pharma companies. My most passionate readers, will remember for sure the Winnti group, a Chinese APT discovered by Kaspersky Lab in 2013 that targeted companies in the gaming industry. According to the experts, the Winnti gang has been active […]
Experts at Symantec observed a significant upsurge in activity over the past year for the Dyre financial Trojan used to target banking customers worldwide The operators behind the popular Dyre banking trojan appear very active in this period, according to security experts at Symantec they are working hard five-day a week to maintain some 285 command […]
Swedish Co-Creator Of Blackshades RAT was sentenced by the US authorities to 57 months in prison. Another success of the law enforcement against cybercrime. A New York federal court sentenced Alex Yücel (a.k.a. “marjinz“), a Swedish man, who is the alleged mastermind behind the BlackShades Remote Access Tool (RAT). BlackShades is a popular RAT in the […]
The security researcher Patrick Barker discovered that Samsung is disabling Windows Update to run its own bloatware opening users to cyber attacks. The security researcher Patrick Barker discovered that Samsung is disabling Windows Update to run its own bloatware leaving is customers wide open to cyber attack. Barker discovered that Samsung disable Windows update after a […]
Altcoin cloud mining hash power online marketplace ScryptCC has been hacked and a large amount of Bitcoin was stolen by the attacker. The news of another clamorous case of Bitcoin theft is circulating on the Internet, Altcoin cloud mining hash power online marketplace ScryptCC has been hacked. In time I’m writing it is not known […]
Privacy advocates claim snooping component was activated within Chromium, potentially exposing private conversations. Privacy advocates are accusing Google. Privacy advocates and open source developers claim over the secret installing of Google software which is capable of listening in on conversations held in the surrounding environment. It seems that the listening component was involuntarily activated within […]
Between April 2014 and June 2015, the IC3 received 992 CryptoWall related complaints, with victims reporting losses totaling over $18 million. Cryptowall is one of the most nefarious ransomware in the wild, in twelve months the FBI has estimated that the overall losses were more than $18 million. Ransomware implements a classic extortion scheme typically demanding that victims pay ransom […]
The NIST has published a document for protecting Controlled Unclassified Information (CUI) when it resides on contractors IT infrastructures. The National Institute of Standards and Technology (NIST) has published a guideline, titled “Publication Citation: Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations“, for protecting Controlled Unclassified Information (CUI) when it resides on contractor IT […]
Adobe has released a security update for the critical Adobe Flash Player vulnerability CVE-2015-3113 that is being actively exploited in the wild. Security experts at FireEye discovered a critical heap buffer overflow vulnerability, coded CVE-2015-3113, that affects Adobe systems. FireEye discovered that the Adobe flaw is being exploited in the wild by the hacking crew […]