Microsoft announced to be aware of a new IE Zero Day vulnerability (CVE-2013-3893) that affects Windows browsers IE 8 and IE 9 recently targeted by hackers. Microsoft announced to be aware of the presence of a zero-day vulnerability (CVE-2013-3893) in its browser IE. Windows browsers IE 8 and IE 9 are affected by serious zero-day vulnerability recently targeted […]
Belgacom hack, the telecommunications company found evidence of digital intrusion in the company systems, many experts believe in a state-sponsored attack. Belgacom hack, the largest telecommunications company in Belgium and primarily state-owned, has announced that its IT infrastructure has suffered a cyber attack malware based. The attackers hacked company IT systems and infected with unknown Malware. According first […]
It is very easy to hack the Nasdaq according the security expert Kolochenko that reported numerous vulnerabilities in the official website of the exchange. Just 10 minutes could be sufficient for an attacker to hack the Nasdaq Stock Market, this is the alert provided by Ilia Kolochenko, head of Swiss information security company High-Tech Bridge. The security expert […]
In an Irish court the FBI Supervisory Special Agent Donahue revealed that FBI had control of the Freedom Hosting company to investigate on child pornography. FBI admitted publicly that the Bureau had compromised the Freedom Hosting, probably the most popular Tor hidden service operator company. The news confirms the suspects raised after that a group of Security […]
Imperva security researchers observed Web attacks involving PHP SuperGlobal variables are gaining popularity within the hacking community. Security researchers sounded the alarm for the possible abuse of PHP SuperGlobal variables by attackers, it is very frequent to read on PHP application that are hacked cyber cybercriminals. Security experts from Imperva sustains that PHP applications are vulnerable due the […]
After months of investigation security researchers from Kaspersky have detected a new cyber espionage campaign dubbed Kimsuky that targeted South Korean organizations. Kaspersky experts have discovered a new cyber espionage campaign dubbed Kimsuky due the names “kim” used by hackers for drop box email accounts during in the attacks. “It’s interesting that the drop box […]
Group-IB Threat Intelligence Report 2012–2013 H1 is an excellent analysis on the state and dynamics of today’s market of computer crimes and cyber threats. Group-IB has recently issued an interesting report titled “Group-IB Threat Intelligence Report 2012 – 2013 H1” on the state and dynamics of today’s market of computer crimes and current cyber threats […]
Security experts continues to observe the evolution of the offer of services and malicious software for fraudsters in the Android underground mobile market. In the last months security firms have observed an increase in criminal activities that exploited Android OS supported by the proactive evolution of the offerings in the underground mobile market. Dancho Danchev is considered one of most accredited experts of […]
The German news agency Der Spiegel reported last act of US surveillance, the NSA is able to access data stored in a wide range of mobile devices including Android, iPhone and BlackBerry. Here we are with weekly news on NSA surveillance activities, last week we were shocked by the news on Bullrun program meanwhile today we discuss on the capability of the agency to access data stored […]
Security researchers at Fox-IT firm found evidence that the spike in Tor traffic is caused by a Mevade botnet that hides its C&C in the anonymizing network. Is the Mevade malware the real responsible for the spike observed in the number of users directly connected to the Tor network? In an article I wrote recently I analyzed the impact on the use […]