The WAAR report issued by Imperva states that Web Attacks increasingly launched from Amazon servers, the overall number of attacks is also increasing. Cloud computing is considered an amazing opportunity for cybercrime, from the perspective of an attacher these powerful architectures have the necessary resources to conduct powerful attacks, and consider also that often the data archived in […]
FireEye CEO David DeWalt explained that threat actors are targeting IT giants for source code and highlighted the importance to adopt new security model. Phishing is a common practice in the hacking community, despite the level of awareness of the threat is high, the efficiency of the attacks is still significant. As highlighted in the […]
Experts at Radware DDoS protection solution provider recently have discovered a new form of DDoS attack they dubbed âTsunami SYN Flood Attack.â Radware DDoS protection solution provider recently discovered a new category of distributed denial-of-service (DDoS) attack, according the experts of the company it is a type of SYN flood dubbed âTsunami SYN Flood Attack.â In just 48-hour period […]
The Snappening, hundreds of thousands of unaware users have had their personal Snapchat photos and videos public disclosed by hackers. The Fappening is considered my mass media one of most interesting case of privacy violation, four archives containing a numerous celebrities nude photos have been released in the last weeks … and many experts sustain that the […]
A document on NCR ATM API Documentation disclosed on Baidu may have helped criminals to develop malware used in the recent attacks against ATMs worldwide. Recently Kaspersky Lab spotted a series of attacks on ATM machines which were infected by the Tyupkin malware, the malicious code is used by criminal organizations to compomise the banking machines […]
The last report issued by Arbor ATLAS Shows an increase in Reflection DDoS Attacks in Q3 2014, specifically for SSDP reflection attacks. Arbor Networks has published the quarterly report on global DDoS attack data related to Q3 2014, the slides show the distributed denial of service (DDoS) attack trends for the first three quarters of 2013. The data […]
Proofpoint firm uncovered a malicious campaign run by the Northern Gold criminal group which is targeting online banking users with a botnet of 500,000 PCs . Security experts at Proofpoint firm have identified a Russian-speaking cybercrime gang, dubbed Northern Gold, that has compromised more than 500,000 machines worldwide to steal users’ online credentials for major banks in the […]
Criminal gangs have stolen millions of dollars from ATMs worldwide using the Tyupkin malware which forces machines to dispense cash. Criminal gangs in Eastern Europe are increasing the number of attacks against automated teller machines (ATMs), not only tampering the machine with card skimmers which steal debit card data, but also using malware. The malicious code used by […]
The Fappening 4 – The fourth wave of nude celebrity photos hacked from the iCloud system was leaked online, new stars victimized including a male. A new episode of the Fappening Saga is out, online comes the fourth archive (the Fappening 4), of celebrity nude photos leak, and for the happiness of women the collection includes the photos […]
The security expert Jonathan Hall found evidence that a gang of Romanian Hackers exploited the Bash Bug flaw to hack Yahoo servers. The Security researcher Jonathan Hall, president of IT consulting firm Future South Technologies, said that a gang of Romanian hackers exploited the Shellshock vulnerability to gain access to Yahoo servers, and Yahoo! has confirmed the violation […]