Hit and Run DDoS attacks are composed by a series of short bursts of high volume attacks, having a limited duration, and are arranged periodically, and … Incapsula firm has recently published a blog post to explain the efficiency of hit and run DDoS attacks, as remarked by the experts attackers don’t need to arrange large scale […]
Security Experts at PhishLabs revealed that a vishing campaign targeted banking industry to harvest credit/debit card data from customers. The security firm PhishLabs revealed that numerous US banks are victims of a recent Vishing (VoIP-based phishing) campaign that is targeting the payment card information of up to 250 Americans per day. Assuming that the withdrawal limits on ATM […]
Security Experts at Symantec discovered scammers are exploiting Facebook users’ intention to hack friends’ account to compromise their profile. Symantec has discovered a new insidious scam against Facebook users, scammers targeted the social media users proposing a bogus Facebook hacking tool that promises to give the access to their friends’ accounts … unfortunately the unique account hacked is the […]
Security experts Cesar Cerrudo conducted a study on the security of components within control traffic lights and similar electronic systems. The hacking of control systems for traffic lights or cyber grids is a prerogative of sci-fi series and movies, hackers could be able to target them causing serious problems. Cesar Cerrudo, CTO at IOActive, has conducted a study to investigate […]
AOL Inc. confirms security breach, email accounts of a significant number users may have been exposed, no financial data has been stolen. AOL Inc. last Monday has confirmed with an official blog post that the company suffered a massive data breach which may have compromised the email accounts of a significant number users, for this reason it is suggested to the clients of […]
Romanian Researcher discovered that Skype application store sensitive User Data Unencrypted on a local database. A Romanian programmer at Hackyard Security Group, Dragoş Gaftoneanu, revealed through a blog post that the popular VOIP application Skype leaves its local database unencrypted. Unfortunately the problem is very common, many applications, especially mobile apps, don’t encrypt application data exposing user’s information to serious risks for their privacy. According Gaftoneanu, […]
Adobe has just released a security updates for Flash Player to fix critical vulnerabilities that are being exploited by hackers to track Syrian dissidents. Adobe has just released security updates for Flash Player to fix critical vulnerabilities that are being exploited in a series of cyber attacks targeting Syrian dissidents complaining about the government. Early April experts at […]
TrendMicro has published an excellent study on the evolution of the Russian underground, detailing products, services and related prices. Max Goncharov has published a new interesting study on the Russian Underground, titled Russian Underground Revisited, one year after the previous report “Russian Underground 101”. Trend Micro report continues its analysis of the services and products offered by cyber criminals in […]
Securi firm has published an interesting post to explain how malware authors could hide a backdoor using PHP Callback functions. Security expert Peter Gramantik at Security Firm has written an interesting blog post to describe how it is possible to hide a backdoor using common PHP callback functions. The technique could surprise the laymen, but malware authors are […]
FireEye Research Labs has identified a new IE zero-day vulnerability exploited in a series of targeted attacks part of the Operation Clandestine Fox. FireEye Research Labs has identified a new Internet Explorer (IE) zero-day vulnerability exploited in a series of targeted attacks. The zero-day flaw affects a wide range of versions of the popular browser, […]