New secret documents leaked by Snowden reveal that CSE monitors millions of Canadian emails to Government, but privacy advocates criticized how CSE does it. Privacy advocates and Canadians are worried by the last bunch of document leaked by Edward Snowden related to the surveillance activities conducted by the Canadian Security Establishment (CSE). The national broadcaster Canadian […]
SIM maker Gemalto confirmed that unknown hackers targeted its systems in the period indicated by Snowden, but denied any massive theft of encryption keys. Just a week ago, the media agencies spread the news that US and British intelligence services have stolen encryption keys of the major SIM card maker Gemalto to spy on mobile […]
A security bug in the WordPress plugin WP-Slimstat could be exploited by attackers to discover a “secret” key and use it to run blind SQL Injections. More than one million WordPress sites are potentially vulnerable to SQL injection attacks due to the presence of a critical flaw in the popular plugin WP-Slimstat. WP-Slimstat is an analytics plugin for […]
The Ramnit botnet has been shut down in a joint effort by the Europol and the security firms Symantec, Microsoft, and Anubis Networks. Another success For the Europol and its allies Microsoft, Symantec, and Anubis Networks. The organizations in a joint effort have shut down command and control servers of the popular Ramnit botnet. The Joint Cybercrime […]
The US Justice Department offers $3 million reward for the arrest of GameOver ZeuS kingpin. The botnet was involved in financial frauds on a large-scale. The Justice Department has announced a reward of up to $3 million for the capture of the GameOver ZeuS botnet master. The malicious botnet was used by “a tightly knit gang […]
Security experts at TrendMicro observed significant improvements in VAWTRAK banking trojan which couples use malicious macros and Windows PowerShell. Early 2015 the Microsoft Malware Protection Center (MMPC) issued an alert about a surge in the infections of malware using macros to spread their malicious code. The experts MMPC have observed a significant increase in enable-macros […]
The McAfee Labs Threat Report: February 2015 analyzes security level of mobile apps and the evolution of principal cyber threats. Last year the Carnegie Mellon University’s Computer Emergency Response Team (CERT) analyzed the level of security implemented by Android applications, in particular the experts focused their investigation on Android applications that failed to properly validate SSL certificates. The […]
The NSA Director Rogers urges the creation of an independent legal framework to regulate the operations conducted US authorities. The NSA director and commander of U.S. Cyber Command, Admiral Michael Rogers, told a Washington cybersecurity forum that legislators need the creation of a legal framework to regulate the operations conducted by law enforcement and intelligence-gathering organizations worldwide. […]
Alleged Hacker belonging to the hacking crew Lizard Squad run a DNS hajacking attack against the Google Vietnam domain. A nasty surprise for Internet users who visited the Google Vietnam website that was presented with a picture of a man taking a selfie, along with a message that claimed the website site was hacked by the […]
Samsung smartTV send unencrypted voice recognition data and text information across the Internet without encrypt it, allowing hackers to capture them. A few days ago I was one of the first to publish the news about the Samsung privacy policy that reports smartTV are sending user voice data to third parties. “Samsung SmartTV transmits data […]