A team of German researchers developed an innovative Android app dubbed DREBIN capable of detecting 94 percent of mobile malware. A team of German researchers composed by Daniel Arp, Konrad Rieck, Malte Hubner, Michael Spreitzenbarth of Siemens computer emergency response team and Hugo Gascon of the University of Gottingen have developed an Android app capable […]
The student Andrew Aude discovered a still unreleased feature for payments of Facebook Messenger by using the iOS and Mac OS X hacking tool Cycript. Facebook is preparing to enter the world of mobile payments according to a recent report published by Techcrunch. The student at Stanford, Andrew Aude discovered a still unreleased feature of Facebook Messenger by […]
Proofpoint firm uncovered a malicious campaign run by the Northern Gold criminal group which is targeting online banking users with a botnet of 500,000 PCs . Security experts at Proofpoint firm have identified a Russian-speaking cybercrime gang, dubbed Northern Gold, that has compromised more than 500,000 machines worldwide to steal users’ online credentials for major banks in the […]
A zero-day in Bugzilla bug-tracking tool allows anyone to view detailed reports about unfixed vulnerabilities in a wide range of vulnerability repositories. A new vulnerability in Bugzilla is scaring the security industry, it affects the Mozilla’s bug-tracking software, and could have a serious impact. The vulnerability in Bugzilla could be exploited by attackers to view […]
The security researcher Michal Zalewski revealed the details of other two additional bugs he discovered in the Bourne Again Shell after the Bash Bug case. IT community worldwide has been shocked by the discovery of the Bash Bug flaw, a vulnerability that was present in the popular Bash component for more than two decades. While principal […]
Two researchers Brandon Wilson and Adam Caudill released their attack code to reprogram USB sticks and use them as an undetectable hacking instrument. Recently, two independent researchers, Brandon Wilson and Adam Caudill, have released the code which can reprogram, benign USB devices turning them in malicious components. The experts published the code on the Github raising the question related […]
A digitally signed version of the popular CryptoWall ransomware is distributed via five Alexa top-ranked websites in a widespread malvertising campaign. Security experts at Barracuda Labs have discovered a new variant of CryptoWall ransomware in the wild, the new strain of malware presents a valid digital signature and it is being delivered as part of a widespread malvertising […]
Security experts speculate that the Chinese government is using mobile spyware, MITM attacks and Internet monitoring to control Hong Kong protesters. In the last days I published the news regarding a spyware used to spy on activists in Hong Kong, a Fake Occupy Central app is targeting the smartphones of the activists belonging to the Occupy Central […]
DARPA announced the deployment of the ASOM technology which will be used to inspect critical equipment to detect counterfeit microelectronics. The presence of counterfeit microelectronics in cybersecurity equipment is considered a critical problem for the US Government, in military sector the hardware qualification has assumed a crucial importance for national cyber security strategy. The US DARPA supports the development of the […]
The Europol issued 2014 Internet Organised Crime Threat Assessment (iOCTA) report to provide details about on-going developments in the cyber criminal ecosystem. The Europol European Cybercrime Centre (EC3) has issued the 2014 Internet Organised Crime Threat Assessment (iOCTA) which describes the evolution of cybercrime an the models of sales adopted in the criminal ecosystem. This ‘Crime-as-a-Service‘ business […]