The part 6 of the Fappening archive is online, it includes image of Nicola Peltz, Krysten Ritter, Angie Miller, Aubrey Cleland and Tobie Perciva. The effects of the Fappening, aka the iCloud Hack, are still evident in the cyberspace. Relentless hackers have released over the weekend a new archive, it is the part 6 of the […]
Security firm Damballa issued the ‘State of Infections Report Q3 2014’ that highlights a 57% increase in infections of the notorious Backoff POS malware. Security experts at Damballa security firm detected a 57% increase in infections of the popular Backoff malware in the third quarter, the number of infections was jumped high from August to September and […]
The researcher Josh Pitts of Leviathan Security Group identified a Russian Tor exit node that is patching the binaries downloaded by the users with malware. Once again Tor network is under attack, the researcher Josh Pitts of Leviathan Security Group has identified a Tor exit node that was used to patch the binaries downloaded by the […]
Trend Micro discovered a cyber-espionage operation dubbed Operation Pawn Storm, which is targeting military, government and media entities worldwide. A new cyber espionage operation targeting military, government and media agencies on a global scale has been discovered by security experts at Trend Micro. Also in this case it seems that the threat actors behind the operation, dubbed […]
Unknowns have hacked the NFC based electronic payment system used in Chile, the “Tarjeta BIP!”, spreading an Android hack that allows users to re-charge cards for free In Chile NFC electronic payment is already a reality, “Tarjeta BIP!” is the name of the payment system used to pay for public transportation with users’ smartphones that support the standard. […]
Operation Distributed Dragons – Tiger Security firm has discovered a series of DDoS attacks from China and that appear as run by a structured organization. Security experts at the Italian Tiger Security firm have spotted a new wave of DDoS attacks that were originated in China and that appear as run by well organized APT. The expert identified […]
Experts at Symantec have detected a scam based on Dropbox accounts to serve phishing pages over secure communication channels. Recently a massive data leakage has interested DropBox, a week ago a guest account post on Pastebin four different documents, all claiming to be part of “the massive hack of 7,000,000 accounts”. The author also anticipated that there are “More to […]
The Ponemon Institute as published its fifth report on the cost of cybercrime which provides interesting data on impact on the US companies. Which is the cost of cybercrime suffered by US companies? The fifth annual report published by the Ponemon Institute and titled “2014 Global Report on the Cost of Cyber Crime” reveals that cyber […]
A new wave of malvertising attacks finalized to cyber espionage is targeting military contractors to military secrets and intellectual property. Security experts at security company Invincea have uncovered a new malvertising campaign used as a attack vector for highly-targeted cyber espionage operations against at least three firms in the US military industry. The malvertising is becoming even more popular in the […]
Group-IB published the annual HIGH-TECH CRIME TRENDS 2014 Report, a document focused on high-tech crimes associated with traditional computer crime. Group-IB, a leading company in cybercrime prevention and investigations, has issued its annual report titled “GROUP-IB REPORT: HIGH-TECH CRIME TRENDS 2014″ which cover the second half of 2013 and the first half of 2014. The report is one of […]