Symantec revealed observed a significant drop in the number of Financial Trojans in 2014, a report includes a detailed analysis of the phenomena. Symantec has analyzed the evolution of Financial Trojans in 2014 highlighting a significant drop in the number of detection of malicious agents. Symantec analyzed nine common financial Trojans during 2014, the sample analyzed targeted […]
Experts at Cisco discovered a new technique dubbed Domain Shadowing consisting in the creation of thousand subdomains used to spread the Angler exploit kit Cyber criminals have used hundreds of legitimate domain name accounts registered through GoDaddy to run a malicious campaign using the popular Angler exploit kit. Crooks hacked domain name accounts in order […]
Internet users that want to create a new account on Twitter through the Tor network must now provide a phone number to verify their identity. A few days ago, Twitter announced plans to begin tracking users via their mobile phone number, a measure that the company consider necessary in order to fight the trolls. Following the […]
FREAK, a new major security flaw that left users of Apple and Google devices exposed to MITM attack while visiting supposedly secure Websites. IT industry is facing with a new major security SSL/TLS vulnerability that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of […]
A GAO report to FAA reveals that the systems adopted in the Aviation industry are still affected by weaknesses that could be exploited by hackers. A report published by Government Accounting Office (GAO) in January urges the Federal Aviation Administration (FAA) to adopt a formal process to “Address Weaknesses in Air Traffic Control Systems.” The FAA has taken steps […]
Security experts are alerting on the availability in the underground black market of a zero day exploit for a vulnerability in the phpMoAdmin MongoDB GUI. In February, three students from the University of Saarland in Germany discovered that MongoDB databases running at TCP port 27017 as a service of several thousand of commercial web servers are exposed on the Internet without proper defense […]
DARPA is working on Cognitive Fingerprints authentication process to validate the user identity through the use of software based biometrics. Security plays a crucial role in today’s world. Whether it is a multi-billion organization or a single person with a computer, security is important for all. One of the pillars for cyber security is the […]
Cybercriminals are targeting call centers operators in Apple Pay fraud to circumvent the checks implemented by Apple, banks and card issuers. The security expert Cherian Abraham revealed a spike in the fraud on Apple’s mobile payment platform, Apple Pay. The criminals are trying new techniques to compromise the Apple security chain. While the Apple devices and software are […]
D-Link routers contain a vulnerability that could be exploited by attackers to get root access remotely and run several attacks. Once again security experts have found security vulnerabilities in home routers, these devices are a privileged target of cyber criminals that exploit the flaws in the software they run for several purposes. This time the flawed routers […]
A British hacker has found two Blu-Ray-borne attacks that could be run to infect machines, a technique that remind the method used by the Equation Group. Security expert Stephen Tomkinson from NCC Group has discovered a couple of vulnerabilities in the software used to play Blu-ray discs. The exploitation of the flaw could be used to implant […]