Google has announced serious actions to prevent ad injectors that compromise the integrity of usersâ browsing experience across the globe. Google has declared âwarâ on programs that compromise the integrity of usersâ browsing experience across the globe. In a recent blog post featured on Googleâs Online Security Blog, Google has released information surrounding research that […]
Researchers at Trend Micro spotted a 64-bit variant of NewPosThings PoS malware designed to steal payment card and other sensitive data. Researchers at Trend Micro have identified a new strain of the NewPosThings point-of-sale (PoS) malware. The new variant of NewPosThings malware is a 64-bit version of NewPosThings, a point-of-sale (PoS) malware discovered by experts at Arbor Networks in […]
A new executive order signed by the US President Obama imposes sanctions against every entities that is threatening US assets, even overseas hackers The President of United States, Barack Obama has signed an executive order that uses economic restrictions to “control” anyone that is trying to attack any American interests. But what this exactly means? […]
Security experts at MalwareBytes discovered that unaware WordPress users are infected with a banking trojan served by a fake Pirate Bay website. Some WordPress websites are being used to redirect users to a fake Pirate Bay that is being used to make the reader to push malware, says Malwarebytes. WordPress websites were injected with the same iframe during the […]
A security researcher discovered that the improper configuration of some multicast DNS (mDNS) implementations could be used to amplify DDoS attacks. The multicast Domain Name System, also known as mDNS,  is a multiplatform service designed to resolve host names to IP addresses within small networks that doesn’t have a local name server. The mDNS can work in a […]
Security experts revealed that more than 100,000 home routers belonging to Australian households are still vulnerable to the PODDLE vulnerability. Once again, home routers are exposed to the risk of cyber attacks. This time the news is related to the Australian consumer broadband modems that resulted affected by the Poodle and Freak vulnerabilities. Many Australian households […]
A Russian researcher has discovered a critical vulnerability in YouTube that could have been exploited by a hacker to delete any video from the website. The Russian security researcher Kamil Hismatullin has discovered a critical flaw in YouTube that could be exploited by attackers to delete any video the popular video sharing service. The bug hunter is […]
A security researcher discovered a couple of security issues on GitHub platform explaining how it is possible to exploit them in real attack scenarios. The researcher David Sopas (@dsopas) from Websegura discovered a couple of security issues in the coding website GitHub that were ranked by the company as minor, but that could expose users to cyber attacks. […]
President of ECIPS warns of cyber terror problems ahead at C I P R congress.  Terrorism is evolving with cyber warfare capability. Critical Infrastructure Protection & Resilience meetings were attended by almost every agency in EU and US defense department. The Critical Border Cyber Defense Infrastructure of the EU Critical Infrastructure Protection & Resilience […]
Volatile Cedar APT group is a new hacking team, apparently from Lebanon, that compromised systems worldwide, most of those in Israel Security experts from Check Point Software Technologies have uncovered a new cyber espionage campaign, dubbed Volatile Cedar, that targeted hundreds of entities from at least ten countries (Lebanon, Israel, Turkey, the UK, Japan, the US, etc.). The […]