An independent researcher has analyzed for years the metadata on submissions to VirusTotal service identifying patterns related to many bad actors. VirusTotal is the Google owned company which offers free checking of URLs and files for viruses and other malicious code, its systems use up to 54 different antivirus software to scan files and URLs provided by the userscheck. Cyber criminals […]
Investigation on celebrities naked pictures leaked online raises suspicion that hackers breached iCloud accounts exploiting a flaw in the “Find my IPhone” feature. An alleged hack of Apple’s iCloud accounts of many celebrities seems to be the cause of the leakage online hundreds of naked photos purportedly belonging to more than 100 actors and singers. On […]
Dominique Bongard has presented an improvement to previous attack on WPS which allows to discover the PIN in just one second with offiline calculations. The researcher Dominique Bongard has presented an improvement for the attack on wireless routers with poorly implemented versions of the WPS (Wi-Fi Protected Setup). The WPS is a popular network security standard that allows […]
FBI and National Counterterrorism Center issued a memo to warn Government agencies on the risks related to Google Dorking on their websites. On July 7th, the FBI and the National Counterterrorism Center issued a memo to warn law enforcement and private security agencies about the practice of Google Dorking and its capabilities. The FBI warns the recipients […]
US law enforcement and private security firms are investigating on a series of cyber attacks which hit JPMorgan and other financial institutions. The FBI announced that the Bureau is investigating media reports of cyber attacks on US banks and financial firms, but law enforcement hasn’t provided further information on the incidents neither on the affected companies. […]
Routers manufactured by Netcore and sold worldwide under Netis brand have a wide-open backdoor that can be fairly easily exploited by threat actors. Experts at TrendMicro discovered that routers manufactured by Chinese security vendor and sold under the brand name Netcore in China have a hard-coded password. The hard-coded password allows attackers to access user’s traffic with a backdoor, […]
A group of hackers dubbed DERP has created a super tool to coordinate multi protocol DDoS reflection attacks as explained by Melbourne-based Micron21 firm. For the first time ever a hacking group coordinated a range of different DDoS reflection attacks against a data center of the firm Melbourne-based Micron21, the attack occurred on August 2nd. The experts […]
Researchers demonstrated a new side channel attack which allow them to steal encryption keys by simply touching a laptop. Yesterday I published a post on an interesting research conducted by a the team of experts which demonstrated an attack exploits “a newly discovered public side channel” allowing threat actor to access the shared memory statistics of an […]
Researchers have developed a malware which exploits “a newly discovered public side channel” which allows the access to the shared memory statistics of an app’s process. Researchers have developed a proof-of-concept malware running on an Android OS that can silently syphon sensitive data from mobile apps on Android, iOS and Windows Phone with up to a 92% success rate. […]
The day after the crash of Malaysia Airlines Flight MH370 hackers stole classified data from the computers of senior officials involved in the investigation. Just after the incident occurred to the Malaysian Airlines Flight MH370 a spear phishing attack targeted 30 government officials and bad actors have stolen classified documents relating to the missing Flight MH370. “The computers of […]