A GPS vulnerability could allow hackers and terrorists to hijack ships, drones and commercial airliners, the GPS expert Todd Humphreys demonstrated it. A GPS vulnerability could allow hackers and terrorists to hijack ships, drones and commercial airliners, the news represents a motivation of the greatest concerns for responsible for the national security of every country. […]
Imperva released a Web Application Attack Report that provides an overview of the principal cyber security events occurred during the last 12 months. Imperva security firm has just released last annual Web Application Attack Report (WAAR) that provides an overview of the principal cyber security events occurred in the cyberspace during the last 12 months. […]
KINS trojan is the name of the new banking malware that RSA researchers discovered thanks to an announcement on the Russian black market. Early 2013 RSA discovered traces of a news banking trojan named KINS, security experts have followed the evolution of the malware in the underground community. RSA researchers discovered an announcement on the Russian […]
Context Information Security  issued the report “Web Application Vulnerability Statistics 2013” that provides statistic on Web Application Vulnerabilities based on data gathered from a range of IT security activities and consultancy engagements during last three years. The number of data breaches is increasing in concerning way also thanks to numerous cyber attacks that exploited Web Application Vulnerabilities in many web […]
After a weekend of outage and various mysterious password reset emails Apple has revealed that the iOS Developer Center was hacked. After 3 days of absolute silence of the voice of a possible hack to the IOS Developer Center, Apple has just confirmed that it was the victim of a cyber attack. The iOS Developer Center web […]
The news for clamorous data breaches on Tango Application and The Ubuntu Forum create concerns on the level of security offered by principal service providers News of numerous and clamorous data breaches due cyber attacks is circulating on the internet, massive database from the Tango messenger server was hacked by the Syrian Electronic Army and […]
A vulnerability on SIM cards, and in particular on the DES algorithm for the encryption, could compromise the security of mobile phones. A serious vulnerability on SIM cards used in some mobile phones has been found, exploiting the flaw an attacker could eavesdrop on phone conversations, could install malicious applications on the device or it could impersonalize […]
Security experts uncovered an unusual cyber espionage campaign based on file infector belonging to the PE_EXPIRO family that includes information theft module Security experts at TrendMicro uncovered an unusual espionage campaign that hit United States users based  on malware having file infector with stealing capabilities. The attackers acted with specific intent to steal information from organizations or […]
âCyber-crime, securities markets and systemic riskâ is the study issued by IOSCO and WFE that discussed systemic impact by cybercrime on securities markets âCyber-crime, securities markets and systemic riskâ is the title of a paper issued by The International Organization of Security Commissions (IOSCO), a leading policy forum for securities regulators, and the World Federation […]
Trend Micro uncovered targeted attack against European and Asian government agencies to steal login credentials from IE and Microsoft Outlook products. A new targeted attack has been uncovered by Trend Micro security experts, the hackers hit European government agencies trying to steal login credentials from Internet Explorer (IE) and Microsoft Outlook. The attackers trying to […]