PaloAlto and with WeipTech have identified 92 samples of a new iOS malware family in the wild dubbed KeyRaider that compromised over 225,000 Apple accounts. Palo Alto networks announced recently that a new iOS malware called KeyRaider allowed crooks to take over more than 225.000 apple accounts on jailbroken iOS devices. KeyRaider allows the attackers […]
The experts at EFF organization speculate that Russian State-sponsored hackers belonging the APT 28 group have managed the last EFF Spear phishing Scam. Attackers, alleged to belong to a Russian state-sponsored APT registered a bogus Electronic Frontier Foundation domain earlier this month. The hackers used the name brand of popular privacy watchdog in an attempt to trick […]
According to a report published by the Citizen Lab Iranian hackers have elaborated a sophisticated phishing scheme to takeover Gmail accounts. According to a report published by the Citizen Lab at the University of Toronto’s Munk School of Global Affairs, Iranian hackers have elaborated a sophisticated phishing scheme to circumvent security measures that defend Gmail […]
Employees are the greatest security risks, especially since they are prone to be used as pawns for hackers. That’s why they are vulnerable to attacks. Mobile technology has changed the landscape of business these days. It has enabled employees to set up virtual offices, have more work flexibility, and even extend working on their own […]
In this post the author Scott Thompson explores the basics of Point-of-Sale Security analyzing threats and possible solutions. Basics of Point-of-Sale Security In late 2013, at the height of the holiday shopping season, Target Corporation’s point-of-sale payment network was breached, and over 70 million customers had their card payment information stolen, including this author, creating […]
Starting from September 1st, 2015, Google will disable Flash’s ability to auto-play in its Chrome browser. What will change for advertisers? Google is going to disable Flash’s ability to auto-play in Chrome, the change will be introduced starting from September 1, 2015. Since this date, non-important Flash files will need explicit user’active to play in the browser. […]
A new set of rules was created by the Department of Defense (DoD) for Cloud Providers to report security holes when dealing with US government data. A new set of rules was created by the Department of Defense (DoD) of the US government for how the cloud providers should report the security issues that involve […]
DSL home routers from a number of vendors contain hard-coded credentials that could allow a hacker to hijack the network devices via telnet services. A bunch of home gateway vendors, presumably sourcing their firmware from the same place, can be hijacked using depressingly common hard-coded logins. Experts from the Carnegie-Mellon CERT discovered that a number of home […]
Moscow Lawyers complain to prosecutors over Windows 10 privacy, the Microsoft operating system is accused spying on its users and collect their data. Russian lawyers have filed a complaint calling for restricting the sale of Windows 10 in Russia, the action urges because the newborn OS spy on users violating Russian laws. Starting July 29, and for the […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Dark marketplaces raked from $300,000 to $500,000 a day How to hack a Parrot drone on the fly How BitTorrent could let lone DDoS attackers bring down big sites […]