Security Experts at Palo Alto Networks have discovered a new variant of malware dubbed WireLurker that is infecting Apple mobile devices. A new strain of malware dubbed WireLurker  is threatening Apple users, the malicious code is able to infect Apple iPhone and iPad syphoning user’data. The malware was discovered for the first time by experts […]
Security experts at AppRiver firm uncovered Malicious Amazon phishing emails that aim to infect Holiday Shoppers in the U.S. and U.K. Researchers at AppRiver firm reported that cyber criminals are targeting holiday shoppers at Amazon UK with large a scale phishing campaign, which is spreading malicious emails. The emails sent by crooks include malicious Microsoft Word documents […]
Operation Onymous – Law enforcement and judicial agencies around the globe conducted a joint action against dark markets on Tor networks. This morning I have reported the news of the seizure for the underground black market Silk Road 2.0 and the arrest of its alleged manager, Defconâ Benthall. In reality, the shutdown of Silk Road 2.0 is […]
Silk Road 2.0 shut down by the FBI that arrested Blake âDefconâ Benthall, alleged operator of the underground black market specialized in the sale of drugs. The FBI announced the arrest of Blake Benthall, also known as “Defcon,” the alleged owner and operator of black market Silk Road 2.0, Ars that is following the case […]
A two-year study conducted by researchers at Bitdefender analyzed more than 850000 Facebook scams identifying the most popular frauds. Experts at Bitdefender antivirus software provider have conducted a two-year study on the way crime exploit the popular social network Facebook, the analysis examines nearly 850,000 Facebook scams. The study on Facebook scams analyzed data from different […]
The attacks from humans against the humans as the preliminary phase of a bigger cyber attack will become harder to mitigate, let’s see how the cybercrime works. Standard incident response requires finding out the real extend of the incident. This is why we have all the monitoring tools where we can find any matching patterns. […]
Security experts at TrendMicro have discovered a new Phishing technique dubbed Operation Huyao that it very hard to detect by site owners and end-users. Security experts have uncovered a new phishing technique, dubbed Operation Huyao, targeting online shopping websites and that is considered by researchers a significantly change to the threat landscape for phishing activities. In a classic […]
Security experts at Fortinet detected a new variant of Backoff malicious code dubbed ROM, which is an improved version of the popular POS malware. A new strain of the Backoff point of sale malware has been detected in the wild by security experts at Fortinet, the new variant dubbed ROM (W32/Backoff.B!tr.spy) appears more fine-tuned. Like Backoff, ROM […]
A group of hackers supporting the ISIS hacked the Keighley Cougars rugby teamâs website, the attackers defaced the website with pro ISIS slogans. Keighley Cougars rugby teamâs website has been hacked by Islamic extremists, ISIS. Users who tried to the website on Sunday were met by a black web page featuring âHacked By Team System […]
A gang of criminals has stolen nearly ÂŁ1.6m in raids on ATM (Automated Teller Machines) in UK. The group used a malware to compromise more than 50 ATMs. According to the police, a group of Romanian criminals has stolen nearly £1.6 million in series of jackpotting attacks. The technique of the jack spotting was presented for the first time […]