Google has announced the introduction of an improved two-factor authentication mechanism based on a USB token dubbed Security Key. Google firm considers cyber security a pillar of its business, the last initiative announced by the company is the introduction of an improved two-factor authentication system for its services, including Gmail. The new 2FA process is based on the use of a […]
Two researchers at Fortinet have demonstrated during the last Black Hat Europe conference how to hide a malicious Android APK in images. Mobile devices are continuously under attacks, cyber criminals are improving their technique to attack mobile users and increase the profits. A new technique recently disclosed, allows attackers to hide encrypted malicious Android applications inside […]
The Ponemon Institute as published its fifth report on the cost of cybercrime which provides interesting data on impact on the US companies. Which is the cost of cybercrime suffered by US companies? The fifth annual report published by the Ponemon Institute and titled “2014 Global Report on the Cost of Cyber Crime” reveals that cyber […]
Researchers at the last Black Hat Europe have presented the results of their research on DTM/FDT components, demonstrating the presence of serious flaws. The researchers Alexander Bolshev and Gleb Cherbov at Digital Security, have discovered several serious vulnerabilities in industrial components designed to implement the management interface industrial control systems (ICS). The experts have analyzed the implementation of Field Device Tool / […]
Two researchers analyzed Smart meters widely used in Spain and discovered that can be hacked by attackers to harm the overall National power network. Internet of things devices are becoming a privileged target of cyber criminals, recently Akamai disclosed the existence of the Spike botnet which used by bad actors to run DDoS attacks through desktops and IoT devices. Another report issued by the same vendor […]
A researcher presented a new attack method dubbed Same Origin Method Execution which could be exploited to impersonate the targeted user on many websites. Same Origin Method Execution (SOME) is a new technique of attack against website presented by Ben Hayak, researcher at Trustwave, at Black Hat Europe in Amsterdam. The Same Origin Method Execution (SOME) attack method is […]
ID system of South Korea faces a significant overhaul in response to major data breaches occurred in the last years which impacted the entire population. Several times we have discussed about the economic impact of a data breach, but in the majority of cases, they were just a raw estimation to give the experts an idea […]
Microsoft has released 8 security bulletins as part of October 2014 Patch Tuesday, it patches 3 Zero-day flaws actively being exploited in the wild. Microsoft has released eight security bulletins on Tuesday as part of October 2014 Patch Tuesday, they fix dozens of vulnerabilities including the widely discussed zero-day flaw exploited by the Russian group of […]
The POODLE against SSL 3.0. A new attack on SSL is threatening the Internet again, it allows bad actors to decrypt traffic over secure channels. Another critical flaw affects one of the protocols most used to secure Internet traffic, Secure Sockets Layer (SSL) and attacker could exploit the attack dubbed POODLE (Padding Oracle On Downgraded Legacy Encryption) to run a […]
Last ICS-CERT MONITOR report reveals that hackers had access to the systems of an unnamed manufacturing organization for several months. According to the ICS-CERT MONITOR report, which summarizes the Industrial Control Systems Cyber Emergency Response Team’s (ICS-CERT) activities between May – August 2014, threat actors had access to the systems of an unnamed manufacturing organization for […]