British navigation technology “eLoran” is under examination of US military to thwart GPS jamming, it is under evaluation as complementary system to the GPS. Congressman John Garamendi introduced a bill that would require the U.S. Secretary of Defense to establish a backup for GPS within three years using a new type of navigation technology pioneered by the […]
Linux/Moose is a malware family that targets Linux-based consumer routers turning them into social network bots to use for illegal activities. ESET released a study about a new malware known as Moose worm that is compromising devices that have a weak or default credentials. The principal target of the Moose worm are the linux-based routers, […]
A bug affecting the Messages app allows a string of characters sent to a person via iMessage or SMS to crash an iPhone and cause the Messages app to crash A bug in the Apple iOS can cause the Messages app crash and iPhones automatically reboot when they receive a specific crafted text message. The […]
The Internal Revenue Service (IRS) was breached by hackers that “used an online service provided by the agency” to access data for more than 100,000 taxpayers. According to the Associated Press, the Internal Revenue Service (IRS) suffered a data breach, hackers “used an online service provided by the agency” to access data for more than 100,000 taxpayers. The […]
Iran – The Cyber Attacks Emergency Center in FATA has thwarted a major cyber attack originated from US against the Oil Ministry. The Iranian Government announced that on Tuesday it had foiled a cyber-attack on the Islamic republic’s Oil Ministry. According to the Fars news agency, the Brigadier General Kamal Hadianfar, head of the cyber police, confirmed […]
An Eagle High School student may be charged with a felony after being accused of a cyber attack on the West Ada school district. I have decided to write about this story because it is the demonstration of the interference of cybercrime with the teenager’s life, a 17-year old high school student might be accused […]
Researchers at FireEye have detected a new strain of point-of-sale (POS) malware being used in the wild and served through a spam campaign. A new malware called NitlovePoS has the capability of capture and exfiltrate track one and two from payment cards, and to accomplish that it scans the running processes of the infected machine. […]
The recent report from ISTR has outlined the fact that zero-day vulnerabilities remain unresolved for 59 days. What you can do for online protection. Symantec and the recently published Internet Security Threat Report (ISTR) have made a truly frustrating revelation as to the time period, in which zero-day threats remain undetected. Whereas in 2013 this time […]
McAfee discovered in the Deep Web a ransomware-construction kits that allow easy to build malware in just 3 steps, implementing an interesting model of sale. In the criminal underground it is easy to find malware-construction kits that allow easy to build malicious code from existing templates and in same cases starting from legitimate applications. A […]
A security researcher at Trend Micro discovered that the malware used by the Carbanak cybergang is using a C&C server linked to the Russian FSB. Maxim Goncharov, security expert at Trend Micro, revealed that one of the most sophisticated malware used by the popular gang Carbanak is now pointing to Russia’s Federal Security Service (FSB). The […]