Cyber Crime

74% organizations think they will be hit by an APT in the near future74% organizations think they will be hit by an APT in the near future

74% organizations think they will be hit by an APT in the near future

The ISACA study "2015 Advanced Persistent Threat Awareness-Third Annual" tries to uncover information security professionals’ understanding of APT threats. A…

10 years ago
LowLevel04 ransomware exploits Remote Desktop to spreadLowLevel04 ransomware exploits Remote Desktop to spread

LowLevel04 ransomware exploits Remote Desktop to spread

Experts at Bleeping Computer blog are reporting a new strain of ransomware dubbed LowLevel04 that is spreading via Remote Desktop…

10 years ago
Apple fixes serious flaws in the Productivity AppsApple fixes serious flaws in the Productivity Apps

Apple fixes serious flaws in the Productivity Apps

Updates released last week by Apple for Apple Productivity Apps fix a number of flaws that can be exploited for…

10 years ago
Apple confirms Judge unlock a new iPhone is not possibleApple confirms Judge unlock a new iPhone is not possible

Apple confirms Judge unlock a new iPhone is not possible

Apple told a federal judge that it “would be impossible” to access data on a locked iPhone running one of…

10 years ago
Crooks stole €600,000 in MitM attacks on EMV CardsCrooks stole €600,000 in MitM attacks on EMV Cards

Crooks stole €600,000 in MitM attacks on EMV Cards

A group of French researchers discovered how Fraudsters Stole nearly $680,000 Via MitM Attack on EMV Cards. On October 1st,…

10 years ago
Thousands of Magento websites compromised to serve malwareThousands of Magento websites compromised to serve malware

Thousands of Magento websites compromised to serve malware

Security experts have discovered that thousands of websites running the eBay’s Magento e-commerce platform have been compromised and used to…

10 years ago
A young hacker violated the CIA Director’s private AOL emailA young hacker violated the CIA Director’s private AOL email

A young hacker violated the CIA Director’s private AOL email

A young hacker violated the CIA Director's personal email account and leaked sensitive files including a top-secret application for a…

10 years ago
WiFi jamming, too easy and cheap to run attacksWiFi jamming, too easy and cheap to run attacks

WiFi jamming, too easy and cheap to run attacks

A security analyst has demonstrated that WiFi Jamming, such as the Jamming of Bluetooth and Zigbee systems, is very easy…

10 years ago
The Rapid Increase in the Sophistication of Exploit KitsThe Rapid Increase in the Sophistication of Exploit Kits

The Rapid Increase in the Sophistication of Exploit Kits

The prevalence and effectiveness of top exploit kits (Angler Exploit kit, Nuclear Exploit Kit) found to be very active in-the-wild.…

10 years ago
The ISIL is trying to hack American electrical power companiesThe ISIL is trying to hack American electrical power companies

The ISIL is trying to hack American electrical power companies

US authorities confirmed that hackers belonging to the Islamic State (ISIL) are trying to hack American electrical power companies. According…

10 years ago