A security researcher has compiled the Ransomware Removal kit that could be used in the process of responding to ransomware infections. CryptoLocker, CoinVault, and TeslaCrypt are the names of some of the most dreaded ransomware that infected million of users worldwide. The extortion is a very common practice in the cyber criminal underground and ransomware are […]
A new top-secret document leaked by Snowden revealed how the NSA and its allies planned to target Android platforms under the project IRRITANT HORN. New top-secret documents leaked by the whistleblower Edward Snowden revealed that the NSA and its allies of the Five Eyes group (United States, United Kingdom, Canada, New Zealand and Australia) planned to hijack […]
Bad actors have released a malicious version of the popular open source tool PuTTY to steal access credentials of computers worldwide. Be careful, there is an unofficial version of Putty in the wild and it seals information. This version was compiled from the legitimate source, but isnât hosted on the official website project, instead, attackers redirect […]
CareFirst BlueCross BlueShield fall victim of a major data breach, personal information belonging more than one million individuals could have been exposed. Health insurer CareFirst BlueCross BlueShield is notifying more than one million individuals that it was the victim of a data breach which may have exposed personal information used by attackers to gain limited, […]
Researchers have discovered a new  TLS vulnerability dubbed LogJam that open a large number of online services to cyber attacks. Logjam is the name assigned to a new vulnerability that affects the Transport Layer Security (TLS) protocol putting a large number of online services at risk. Logjam vulnerability can be triggered through man-in-the-middle (MitM) attacks to […]
A simple vulnerability has been uncovered in the NetUSB component, millions of modern routers and other IoT devices are exposed to the risk of cyber attacks The security expert Stefan Viehbock from SEC Consult Vulnerability Lab has reported a critical vulnerability (CVE-2015-3036) that potentially affects millions of routers and Internet of Things devices using the KCodes […]
The crash of the Airbus A400M military transport in Spain was caused by a software bug, three engines were shut down immediately after the start due to the flaw. Recently we have discussed a lot about the possibility to hack a plane, almost everyone has read about the computer security researcher Chris Roberts which reported the […]
DDoS attacks even more dangerous according to the last report published by Akamai Technologies, the “Q1 2015 State of the Internet – Security Report”. According to Akamai Technologies, Q1 2015 showed that distributed denial-of-service attacks are on the rise again, and according to Akamai Technologies, Q1 set a record for the number of DDoS attacks, […]
A new report published by Arbor Networks and the Ponemon Institute explains how Financial Service and Retail Organizations tackle advanced threats. Regardless of the recent string of high-profile cyberattacks plaguing companies worldwide, the retail industry is still behind on cybersecurity standards, according to new reports published by Arbor Networks and the Ponemon Institute. Researchers disclosed it takes […]
The Bundestag has become the target of a significant cyber attack, hackers tried to compromise the internal network of the German Parliament. The German parliament Bundestag has officially confirmed media reports about a hacking attack that hit the Institution last week. âThere has been an attack on the IT systems of the Bundestag,â spokesman Ernst […]