Experts at Bitdefender have discovered a spam campaign that tricks antispam filters by relying on macros in Empty Word Documents. Security experts at BitDefender observed a new tactic adopted by spammers that rely on emails with an empty Word document in the attachment to bypass anti-spam filters. The social engineering strategy adopted by spammers to lure victims into […]
According to a new series of reports published by Secunia firm, Oracle Java poses the biggest security risks to Desktop machines in the US. According to the a new report published by Secunia security vendor, Oracle Java software represents the principal source of problems for private US desktops, followed by Apple Quicktime 7.x. Oracle Java is […]
The Linux GNU C Library (glibc) versions prior to 2.18 are affected by the GHOST remote code execution vulnerability present in the ‘gethostbyname’ function. A new critical vulnerability is threatening the Linux community, the flaw affects the glibc GNU C library. The vulnerability is present in all Linux systems dating back to 2000 and could […]
The European Union Agency for Network and Information Security has published the annual report on the cyber threat landscape “ENISA Threat Landscape 2014.” The European Union Agency for Network and Information Security (ENISA) has published the annual report on the cyber threat landscape “ENISA Threat Landscape 2014.” This ENISA Threat Landscape 2014 report (ETL 2014) was prepared […]
Adobe released a security update that fixes also the zero-day vulnerability CVE-2015-0311 discovered by Kafeine in the last release of Angler exploit kit. The French security expert Kafeine has recently discovered an unpatched vulnerability (0day) in Flash Player is being exploited by Angler Exploit Kit. The new variant of the Angler exploit kit that exploit […]
SplashData has published its annual report on the used of passwords that includes the list of the Worst passwords of 2014. Here we are to analyze the annual study published by SplashData, titled “123456” Maintains the Top Spot on SplashData’s Annual “Worst Passwords” List“, on the use of the passwords. Which are the most common […]
Rapid7 revealed that more than 5000 Automated tank gauges (ATGs) used to prevent fuel leaks at gas stations in US are vulnerable to remote cyber attacks. A recent research conducted by HD Moore of Rapid7 revealed a disconcerting truth, the Automated tank gauges (ATGs) used to prevent fuel leaks at more than 5,000 gas stations in […]
Security Expert Brett Buerhaus has discovered a critical flaw on admin.google.com, which could be exploited by to Hijack an account and disable 2FA Authentication. Even the giants have their Achilles heel, the Google Apps administrator console is affected by a critical cross-site scripting (XSS) vulnerability that could be exploited by attackers to force a Google Apps admins […]
Google ProjectZero disclosed the details of 3 new OS X zero-day vulnerabilities, but experts believe that they could be exploited by hackers to run attacks. If you thought the ProjectZero team worked only to find flaws in Microsoft systems you are mistaken, this time the excellence crew has discovered three more zero-day vulnerabilities affecting the Apple’s […]
The entrepreneur Kim Dotcom has launched MegaChat, a new feature on Mega.nz that allows end-to-end encrypted audio and video communications. The Internet community is even more scared by continuous violation of the privacy for this reason IT community is looking new solutions that could protect users’ experience online from prying eyes. Government could be snooping in our […]