Security experts from Sucuri firm have discovered a large botnet of compromised CCTV devices used by crooks to launch DDoS attacks in the wild. Researchers have encountered a denial-of-service botnet that’s made up of more than 25,000 Internet-connected closed circuit TV devices. We discussed several times about the IoT and the lack security by design that makes […]
Security experts from the firm SentinelOne monitored a recent CryptXXX Ransomware campaign that allowed crooks to make $50,000 in a few weeks. Security experts from security firm SentinelOne have analyzed the activity related to CryptXXX ransomwareâs operators. They discovered that the gang made around $49,700 from the payment of ransoms between June 4 and June 21, 2016, the money […]
Experts from the ISACA organization confirmed that SWIFT hackers have stolen $10 million from a Ukrainian bank through SWIFT system. It is happened again, unknown hackers have stolen $10 million from an unnamed Ukrainian bank through SWIFT loophole. The news was spread by the Kyiv branch of ISACA, the Information Systems Audit and Control Association, that confirmed […]
The cyber security expert Benjamin Tedesco during his vacation in Vienna, Austria, has spotted an ATM skimmer quite impossible to detect to common people. Have you ever seen a skimmer while using an ATM? Unfortunately, we have to admit that it isn’t so easy to find it, in the majority of cases, the victims are not […]
Experts are continuing to monitor the PunKeyPos malware in the wild, the threat might have already stolen millions of payment card numbers. Experts are continuing to monitor the PunKeyPos malware in the wild, the threat might have already stolen millions of payment card numbers. Security experts from PandaLabs spotted a new strain of the PoS malware dubbed PunkeyPos which seems […]
Location services could very useful to find lost devices, but do not do anything silly to find your stolen smartphone, it could be very risky. People underestimate the risk related to the use of technology, a simple post on a social network or a harmless SMS could cause serious problems. Today I desire to share […]
Godless is a new strain of Android Malware recently spotted by experts from Trend Micro that leverages multiple rooting exploits. Godless is a new strain of malware that uses multiple rooting exploit to compromise Android mobile devices. The mobile malware is a sort of hacking platform that includes an open-source rooting framework called android-rooting-tools. The […]
The exploit kit landscape is rapidly changing,the Angler and Nuclear EK disappeared and overall malicious traffic drops by 96% since April. As highlighted by security experts the threat landscape is in continuous evolution, despite the criminal underground was monopolized by Angler and Nuclear exploit kits for several years other EKs represent a serious threat to online […]
The Taiwanese electronics company Acer informed its customers that some of their sensitive financial data may have been accessed by hackers. The Taiwanese IT giant Acer recently confirmed to Californiaâs Attorney General (AG) that unknown hackers compromised its online store and accessed customers’ sensitive data. The leaked data includes credit card numbers, expiry dates, CVC security […]
Adobe Flash Player 22.0.0.192 release fixes the Flash Player zero-day vulnerability (CVE-2016-4171) exploited by the APT group dubbed ScarCruft. Adobe has issued the Flash Player 22.0.0.192, a release that fixes the Flash Player zero-day vulnerability (CVE-2016-4171) exploited by the APT group dubbed ScarCruft in attacks on high-profile targets. The Flash Player flaw CVE-2016-4171 affects versions 21.0.0.242 and earlier for […]