Modern maritime ships are considered a privileged target for hackers and pirates that are increasing their pressure on the Maritime Shipping Industry. Hackers target Cyber Attack on Ships: Maritime Shipping Industry at Risk Modern maritime ships are often monitored and controlled remotely from shore-based facilities thousands of miles away to ensure efficiency. This creates a […]
Security experts at Symantec security firm have uncovered a persistent diet spam operation on Twitter that presents interesting aspects. In July 2014, experts at Symantec have uncovered a spam campaign offering the Green Coffee Bean Extract, a diet supplement, a few months later the experts discovered that the same operators behind campaign is continuing its activities […]
Thomas JiĹikovskĂ˝ suspected of owning the black marketplace Sheep Marketplace, an alternative for Silk Road, was arrested while trying to buy a luxury house. The Operation Onymous and the seizure of the popular Silkroad black market have deeply influenced the underground ecosystem. The closure of Silkroad advantaged other black markets like Evolution and Sheep Marketplace. The Evolution […]
A new study conducted by researchers at the Carnegie Mellon University revealed that dozens of mobile apps collect extensive location data. A new study conducted by researchers at the Carnegie Mellon University revealed that a number of Android mobile apps collects geolocation data related to the users. According to the Wall Street Journal, the researchers […]
The exploitation of the Dell System Detect tool would allow threat actors to remotely install malware on users’ your Dell computers. This specific subject was already talked in mid-November 2014 when it was discovered and reported to Dell which patched it in January 2015, but it’s uncertain if the fix closed all the “holes”. The […]
The presence of a vulnerability in the ANTLabs InnGate devices used in hotels and conference centers exposes users to risk of remote exploit. Recently the security firm Cylance has discovered a vulnerability (CVE-2015-0932) affecting the ANTLabs InnGate devices that are popular Internet gateway for visitor-based networks like the one we find in hotels and convention centers. The exploitation […]
According to Top CSO news website, security experts predict that âHealth records are worth more and easier to get than credit card dataâ The rise in health data breach headlines, may not necessarily suggest an increase in actual data breaches. Itâs possible that organizations are just getting better at discovering that theyâve been breached, so […]
According to Trend Micro, crooks in Asia are conducting the sextortion practice to the next level, including the used of mobile malware to get huge profits. Trend Micro released a new report to bring to light a criminal activity known as sextortion. “Sextortion is a means of coercing cybercrime victims to perform sexual favors or […]
Experts of the Project Zero have disclosed a proof-of-concept for the exploitation of a default setting in Windows 7, 8.1 that allow privilege escalation. A new security issue threatens users of Windows 7 and 8.1, this time experts are warning about a default setting in both OSs that could allow local users to elevate privileges […]
UglyEmail Chrome extension could help Google users to discover which are the companies on the web that track their email messages. Even if the following names donât ring you a bell, companies like Yesware, Bananatag, and Streak are aware of your existence, to be more specific, they know when you open e-mail sent by one […]