Security researchers have uncovered a group of fake recruiting accounts on LinkedIn used for intelligence gathering about security experts. A group of fake recruiter accounts is abusing the LinkedIn professional social network to send invitations to security professionals in various industries. The fake recruiters attempt to deceive targets usually by using a LinkedIn profile with […]
Some Uber trip information is publicly accessible through simple Google queries, the set includes trip and user info, and home and work addresses. Rapid diffusion of technology makes easy phenomena of accidental data leakage, the last one is related to the popular car service Uber. Dozens of trips of Uber customers have been cached by […]
Barclays has created a red team to hack its own computer systems to discover and exploit security vulnerabilities before external attacker do. For someone working in the security area, it’s known that many companies have red teams to attack their own system, but this information is never recognized by the company. Barclays did exactly the […]
Veracode has conducted a research on the security of several mobile gambling apps and discovered a number of flaws that expose enterprises to serious risks. If you belong to a global corporation, the most probably think you will find out is that some of your colleagues have installed mobile apps that don’t belong to the […]
Security researchers from Rapid7 security firm discovered a number of security vulnerabilities affecting several Video Baby Monitors. Researchers find major security flaws in popular networked video baby monitor products that could allow attackers to snoop on babies and businesses. Rapid7 analyzed baby monitors from six vendors, ranging in price from $55 to $260 in order to […]
The security vulnerability Filet-O-Firewall in UPnP is exposing millions of home networking devices at risk for cyber attacks. According to a security advisory recently issued by the CERT at the Software Engineering Institute at Carnegie Mellon University, security vulnerabilities in UPnP are exposing millions of home networking devices at risk for cyber attacks. The problem […]
A group of researchers have developed a method dubbed Mass Vetting (MassVet) to find unknown malicious apps in app stores in 10 Seconds. A group of University researchers has created a new method for detecting malicious apps running on an Android devices called MassVet. MassVet doesn’t use the old method of signatures scanning, instead it compares […]
Agora black marketplace announced Tuesday evening that it will go temporary offline fearing the exploitation of the Tor flaws recently discovered. Operators of principal black markets are concerned about the real level of anonymity offered by the Tor network after the discovery of critical vulnerabilities affecting the anonymizing system. The administrators of the Agora black market, one […]
Charlie Miller and Chris Valasek, the famous car hackers who recently demonstrated that some Fiat Chrysler cars can be remotely hijacked, have been hired by ridesharing giant Uber. The popular hackers Charlie Miller and Chris Valasek who recently hackers a Fiat connected car have announced that they have been hired by the Uber Company. Miller and Valasek […]
PaloAlto and with WeipTech have identified 92 samples of a new iOS malware family in the wild dubbed KeyRaider that compromised over 225,000 Apple accounts. Palo Alto networks announced recently that a new iOS malware called KeyRaider allowed crooks to take over more than 225.000 apple accounts on jailbroken iOS devices. KeyRaider allows the attackers […]