Many times we discussed about the fact that FinFisher was discovered in the wild, the use of popular spyware has been abused by governments and intelligence agencies all around the world. The spyware is for law enforcement and government use, but it seems to be preferred for those regimes that desire to monitor representatives of the […]
North Korea is the center of attention these days for its questionable political strategies and for the dispute raging with the entire West. The contrasts have an inevitable reflection even in cyber space, North Korea is considered one of the most aggressive and dangerous states of digital world. Military tensions in the area is escalated […]
The excellent researchers at ReVuln, Luigi Auriemma and Donato Ferrante, presented at Black Hat Europe 2013 in Amsterdam a way to convert local bugs and features in remotely exploitable security vulnerabilities by using the popular EA Origin 3 platform as an attack vector against remote systems. EA Origin is one of the biggest gaming related digital […]
The news is curious as it is worrying, unknown hackers have violated the US government repository of standards based vulnerability management website, known as National Vulnerability Database (NVD), last week. The NVD website appears down since last Friday, fortunately while I’m writing is up again, the attackers have compromised at least two servers with a […]
One of the leading computer security companies of Russia, Group-IB and its CERT (CERT-GIB), found that Android malware is available for sale by cybercriminals. With explosion of mobile market and increase of Android users, more devices can be infected by malware downloaded through Android Market or Google Play or from 3d party WEB-sites. “Nowadays it is […]
Anticipations on mobile botnets’ existence have been ended by the Damballa Research Laboratory official reports which discovered 40,000 infected mobile devices that have communicated through cybercriminal C&C servers for the first six months of 2011. Moreover, the McAfee research lab early prediction on advent of widely-distributed and more resilient mobile botnets come closer to reality […]
Continues my overview of the main security reports published by leading companies that produce interesting analysis on the analysis of cyber threats, today I desire to introduce the data proposed by Solutionary in the “2013 Global Threat Intelligence Report” (registration is required). The GTIR report provides insight into prevalent cyber threats identified in 2012 thanks […]
The use of technologies to support censorship is deplorable and condemnable but it must be considered that is a sad reality that has sustained the growth of a billionaire market. Many IT companies around the world are specialized in the providing of solutions used by authoritarian regimes to monitor internet use and persecute the opponents. […]
Once again the security of large scale application and platform is challenged, today is the turn of Apple, in particular of its famous Apple store that according the Researchers Elie Bursztein was vulnerable for more than half year. The developer supported Apple to discovery and fix an important vulnerability that allowed to steal passwords and […]
In many occasion we have discussed about the consequences of monitoring activities on internet and communication channels operated by governments all over the world, in particular of the censorship and persecutions operated by authoritarian regimes. In discussion is the technological support often provide by Western IT company in the name of business that totally ignore […]