Security Researcher at CrowdStrike claims VENOM vulnerability leaves millions of virtual machines vulnerable to cyber attacks. A new security vulnerability dubbed VENOM (CVE-2015-3456) is threatening the security industry. The CrowdStrike Senior Security Researcher Jason Geffner who discovered the vulnerability explained that the flaw could be exploited by an attacker to compromise any machine is a data […]
Experts estimated that between 25 to 50 billion devices will be connected to the internet by 2020 will be exposed to an increasing number of cyber threats. Until the end of 2020, experts estimated that between 25 to 50 billion devices on the planet will be connected to the internet, and counting that the Internet […]
Several dozen Imperva Incapsula customers were targeted by a DDoS botnet comprised of tens of thousands of hijacked SOHO routers. Security experts at Incapsula firm spotted a DDoS botnet composed of tens of thousands of malware-infected Small Office / Home Office SOHO routers engaged in application layer HTTP flood attacks. The SOHO routers were infected with a strain […]
New PHP vulnerability dubbed âMagic Hashâ being found by Robert Hansen (aka RSnake) of WhiteHat Security can enable attackers into breaching usersâ accounts. New vulnerability dubbed âMagic Hashâ being found by Robert Hansen (aka RSnake) of WhiteHat Security can enable attackers into breaching usersâ accounts. Because of a security flaw according to which PHP tackles […]
The popular developer Comex has posted online a video Proof-of-Concept to demonstrate that it is possible to run arbitrary code on the Apple Watch. The Internet of things is probably the paradigm that most of all is invading our daily life, smart objects surround us and collect a huge quantity information enlarging our surface of attack. The problem […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Trustwave discovered the first political malvertising campaign Mozilla Fundation, a step toward to full HTTPS implementation How Selerity reported Twitterâs earningsâbefore Twitter did Carders crack Hard Rock casino Australian […]
In recent years the perception of the role of hackers is completely changed, in the past these high-skilled professionals were viewed as dangerous threats that needed to be kept at armâs length, meanwhile today they are highly sought from private companies and intelligence agencies. “An increasingly large number of modern business operations rely on an understanding of the […]
Onapsis study found that over 95% of SAP systems are exposed to vulnerabilities that could lead to full compromise of the companyâs business. SAP is one of the most popular enterprise software used by companies to manage business operations and customer relations. A recent study conducted by the SAP solutions provider revealed that more than 95 percent […]
Law enforcement identifies and located suspects members of a criminal organization that used gas pump skimmers, by using the GPS technology. The number of attacks against ATMs located in supermarkets and Gas pumps is constantly increasing, the crooks use credit and debit card skimmers that use different technologies to steal card data and steal them. Today […]
Hackers have a new tool in their arsenal dubbed Facebook Friends Mapper that allows them to crawl Facebook Hidden Friends list just in a click. Facebook users can protect their privacy by setting the “privacy level” for every information related their profile or content they post online. Users can decide to completely set as private the information in […]