Solutionary security firm published SERT Q4 2013 Threat Intelligence Report to provide an overview of the overall threat landscape. Recently Solutionary security firm published SERT Q4 2013 Threat Intelligence Report to provide an overview of the overall threat landscape, the document is the result of a research conducted over the last three months correlating events across devices […]
Financial Supervisory Service confirmed that Stolen credit card data of at least 20 million bank and credit card users in South Korea has been leaked. While US are facing with a series of clamorous data breached against principal retailers, in South Korea an employee of personal credit ratings firm Korea Credit Bureau (KCB) has been […]
Israeli Security researchers discovered an Android security flaw to bypass active VPN configurations and intercept secure communications. A new alleged flaw in Android mobile could harm user’s privacy over VPN. Israeli security researchers from the Ben Gurion University (BGU), the same that discovered a few weeks ago a vulnerability in the Samsung Knox platform, have […]
At S4x14 Conference in Miami, a researcher at of ReVuln disclosed a buffer overflow zero-day flaw in HMI software produced by Malaysian company Ecava. During the S4x14 Conference in Miami, Luigi Auriemma of ReVuln disclosed a serious vulnerability in HMI software. The team of researchers at ReVuln discovered a buffer overflow vulnerability in the companyâs […]
Security researcher Daniel E. Wood discovered a vulnerability in the Starbucks official iOS app related to the insecure storage of user data. 10 million Starbucks customers who purchases drinks and food using their Smartphones are exposed to serious risk of data breach. This is yet another story in which a poor implementation of minimum security […]
Symantec published in the report titled “Targeted Attacks Against the Energy Sector” to describe the security landscape for companies of the sector. Companies and industries belonging in the energy sector are waiting most targeted sectors on a global scale, Symantec has issued a very interesting report titled “Targeted Attacks Against the Energy Sector” that provide […]
Kaspersky experts discovered a java version of icefog espionage campaign that targeted at least 3 us oil, gas companies spreading a backdoor dubbed Javafog. Kaspersky Lab in September 2013 announced to have discovered Icefog team, an emerging group of cyber-mercenaries available for hire to conduct surgical hit and run operations against strategic targets. The cyber […]
Internet of Things, a business growing at a compound annual rate of 7,9%, which are the principal cyber threats to the popular paradigm? Another week is starting and this morning the topic that I’ve found everywhere is Internet of Things (IoT), it is a growing paradigm that will influence our life in the next future, […]
A default setting in Asus Routers allows an attacker to remotely access data archived on a USB media storage connected to the devices. Swedish users reported an alleged vulnerability in Asus Routers that allows an attacker to remotely access data archived on a USB media storage directly connected to the devices. Asus and many routers […]
Cisco confirmed the presence of a Backdoor that affects small business devices. The flaw was discovered by the French hacker Eloi Vanderbeken weeks ago. Cisco has recently disclosed (Advisory ID: cisco-sa-20140110-sbd) the presence of a backdoor in different small business networking devices, it is an undocumented Test Interface that could be exploited by attackers to […]