Mandiant has released its annual M-Trends 2014 Threat Report, a document that analyzes actors, means and motivations behind attacks observed in 2013. Mandiant FireEye company has released a new detailed report titled “M-Trends 2014 Threat Report” describing actors, means and tactics behind principal attacks conducted in the recent months. The report consolidated data on principal cyber […]
Security Blogger Guya discovered a new Google Chrome eavesdropping bug that allows websites to listen to user private conversations. A second security eavesdropping flaw has been found in Google Chrome browser, a security blogger named Guya has made the alarming discovery. The security blogger discovered that an attacker exploiting the vulnerability in Google Chrome could transform the […]
According principal security firms, extortion, ransom and blackmail are pillars of illicit activities, cyber criminals are adapting them to the cyber context. Extrotion is becoming a worrying inclination in the cyber criminal ecosystem, the number of targeted attacks that request money in change of a suspension of the hostilities and to give back to the victims […]
Symantec has issued The Internet Security Threat Report, a document which provides an overview and analysis of global threat evolution in 2013. Security experts are observing a significant increase in the number of targeted cyber-attacks, it has been estimated that the growth is by 91 per cent in 2013 respect previous year, but most concerning […]
The Heartbleed Bug is a serious flaw in the popular OpenSSL library that allows an attacker to reveal up to 64kB of memory to a connected client or server. Experts which provide maintenance to OpenSSL library have patched a serious vulnerability (CVE-2014-0160) that allows an attacker to gain the access to 64 KB of memory […]
Security experts at Symantec observed a new phishing campaign based on a fake voting application used to steal victim’s credentials. Phishing is a very dangerous threat for Internet users, nearby classic techniques new forms of phishing are exploiting new platforms like mobile and social networks. Phishers continuously improve their techniques to be able to harvest […]
The end of support for Windows XP OS is at hand, the consequences could be serious for specific industries and in counties where the OS is dominant. Timing is running out for Windows XP because the end of support is very close, tomorrow, April 8th 2014, the support for the popular OS will end. After 12 years, support for Windows […]
A security student has discovered a method to fly for free across Europe by generating fake boarding documents designed for Apple’s Passbook app. A 18 year-old security student, Anthony Hariton (@DaKnObCS), from the University of Crete in Greece, has announced that he will present next month a technological trick to fly for free across Europe by generating […]
German authorities have discovered 18 Million Email Passwords, this is probably the biggest Data Theft in the history of the country. German authorities have confirmed that nearly 18 million email accounts were stolen and compromised by hackers, it is the greatest theft occurred in the country in the history. The news was published by the Der Spiegel journal […]
Two Israeli students at Technion-Israel Institute of Technology were able to cause traffic jams hacking the popular navigation app Waze for a school project. In many films we have seen bad hackers who were able to cause Traffic Jams causing death and destruction, this was possible because filmmakers are aware of the high penetration level […]