Within the year of 2014, a lot of data was leaked and this leads to grave concerns as to the future of overall online security. Unfortunately, 2014 was one of the worst years and the reason of that was that a lot if viruses and attempts of violation of online privacy. IBM X-Force Threat Intelligence […]
Despite principal vendors have released updates to fix the FREAK vulnerability many mobile apps for Android and Apple iOS are still vulnerable. Early March, security experts discovered a critical vulnerability codenamed FREAK (CVE-2015-0204), also known as Factoring Attack on RSA-EXPORT Keys, which could be exploited by threat actors to run man-in-the-middle attacks on encrypted traffic when Internet users visited […]
According to a US Lawmaker North Korea Internet outage occurred in December could be a response for the cyber attack against the Sony Pictures On December 2014, the North Korea suffered a significant network outage which isolated the country from the internet. Security experts speculated that the incident was a retaliation for the Sony hack. […]
The Evolution Black Market, the most popular an online black marketplace appears to have vanished, it seems that admins of the website exit scamming. The security community is paying attention to the evolution of dark markets following the operation Onymous conducted by law enforcement in November. Law enforcement in a joint effort against cybercrime seized dozens of black […]
US health insurer Premera Blue Cross announced its network had been hacked, potentially exposing data from 11 million individuals. A few weeks after the disclosure of the data breach suffered by from Anthem Blue Cross, which exposed 80 million customer records, another US health insurer was victim of a major attack that is affecting 11 Million customers […]
Hacker who posted online information on Nuclear Plants in South Korea demands money for not selling other sensitive information to other governments. The Government of Seoul has issued a report blaming North Korea for cyber attacks against computers at Korea Hydro and Nuclear Power (KHNP), a subsidiary of the Korea Electric Power Corporation (KEPCO) that […]
DLL hijacking is not a prerogative for Windows systems, it is a common hacking technique that is very effective against OS X based machines. As you may know, DLL hijacking it’s something that its around since around 2000 and allows hackers to exploit a machine with a vulnerable application ( just one of the possibilities […]
Microsoft has blocked a bogus HTTPS digital certificate that was issued for one of Live Web addresses and could be exploited to run MITM attacks. In January, an unnamed man came into possession of the live.fi certificate after noticing that he was able to use hostmaster@live.fi as an alias for his normal e-mail address. The […]
New versions of OpenSSL will be released on Thursday to patch critical security vulnerabilities, one of which is considered very dangerous. The OpenSSL Project Team announced in an advisory published on Monday that new versions of OpenSSL will be released on Thursday to patch several security vulnerabilities. The disconcerting news is that at least one of them […]
Yahoo announced its new on-demand password feature that lets users into login in their account with a code sent to their mobile phone. Yahoo has announced a new Password-Free login feature to let users access their account without the need for a password. When users will sign in his account, an on-demand password is sent to a […]