The international criminal police organisation Interpol and private researchers discovered a severe flaw in block chain used by virtual currencies. INTERPOL cyber threat researchers, including members of the Kaspersky Lab, have identified a serious vulnerability in the virtual currencies schema. The flaw resides in the âblock chain’ related to virtual transactions and it could be exploited to […]
Security experts from IBM discovered a very sophisticated malware campaign based on the Dyre Trojan to hack Corporate Bank Accounts. IBM has uncovered an important cyber criminal operation dubbed The Dyre Wolf due to the name of the popular Dyre malware used crooks. The Dyre malware was discovered in the wild by several security firms, […]
Researchers at Trend Micro spotted a 64-bit variant of NewPosThings PoS malware designed to steal payment card and other sensitive data. Researchers at Trend Micro have identified a new strain of the NewPosThings point-of-sale (PoS) malware. The new variant of NewPosThings malware is a 64-bit version of NewPosThings, a point-of-sale (PoS) malware discovered by experts at Arbor Networks in […]
Security experts at MalwareBytes discovered that unaware WordPress users are infected with a banking trojan served by a fake Pirate Bay website. Some WordPress websites are being used to redirect users to a fake Pirate Bay that is being used to make the reader to push malware, says Malwarebytes. WordPress websites were injected with the same iframe during the […]
Symantec has discovered a cyber espionage campaign targeting energy companies around the world by infecting them with a new malware dubbed Laziok trojan. Security experts at Symantec have uncovered a new cyber espionage campaign that targeted the energy industry. The threat actors behind the campaign used uses a custom-developed malware dubbed Laziok trojan to exfiltrate sensitive data from […]
President of ECIPS warns of cyber terror problems ahead at C I P R congress.  Terrorism is evolving with cyber warfare capability. Critical Infrastructure Protection & Resilience meetings were attended by almost every agency in EU and US defense department. The Critical Border Cyber Defense Infrastructure of the EU Critical Infrastructure Protection & Resilience […]
Volatile Cedar APT group is a new hacking team, apparently from Lebanon, that compromised systems worldwide, most of those in Israel Security experts from Check Point Software Technologies have uncovered a new cyber espionage campaign, dubbed Volatile Cedar, that targeted hundreds of entities from at least ten countries (Lebanon, Israel, Turkey, the UK, Japan, the US, etc.). The […]
Find out more about online crime and understand why it can be so fruitful, unlike other forms of crime, in order to thoroughly protect your financial transactions and banking details. Unfortunately, nowadays due to the fact that we are used to going on vacation and hold a lot of money in our pockets, it is […]
Security experts at Symantec security firm have uncovered a persistent diet spam operation on Twitter that presents interesting aspects. In July 2014, experts at Symantec have uncovered a spam campaign offering the Green Coffee Bean Extract, a diet supplement, a few months later the experts discovered that the same operators behind campaign is continuing its activities […]
Thomas JiĹikovskĂ˝ suspected of owning the black marketplace Sheep Marketplace, an alternative for Silk Road, was arrested while trying to buy a luxury house. The Operation Onymous and the seizure of the popular Silkroad black market have deeply influenced the underground ecosystem. The closure of Silkroad advantaged other black markets like Evolution and Sheep Marketplace. The Evolution […]