Security experts have discovered a new IE8 zero-day vulnerability exploited to target U.S. Government experts working on nuclear weapons research. Security experts have discovered a new IE8 zero-day vulnerability exploited to target U.S. Government experts working on nuclear weapons research, the concerning discovery has been confirmed by principal security firms that revealed that the flaw […]
APWG published the interesting study APWG Mobile Financial Fraud report on the underground marketplace that revealed the explosion of prolific mobile fraud malware market. The APWG Mobile Financial Fraud report resumed The Anti-Phishing Mobile Working Group investigating on the expansion of the black market for mobile malicious code, the study is crucial to understand the evolution of criminal activities […]
Bloomberg published a report on QinetiQ data breach, the company has been compromised from 2007 to 2012 by Chinese hackers. The UK-based defense contractor QinetiQ is vulnerable to cyber attacks, the news is sensational and has created a lot of noise on the Internet, due the critical role of the company as primary providers for U.S. […]
When the DDoS topic is introduced it’s immediate to link it with the most popular tools usable for this type of attacks, but underground offers much more. When the DDoS topic is introduced it’s immediate to link it with the most popular tools usable for this type of attacks such as the popular LOIC, we must consider that underground offer […]
The systems of the US Army Corps of Engineers’ National Inventory of Dams (NID) were hacked back in January by hacker probably having Chinese origin. The systems of the US Army Corps of Engineers’ National Inventory of Dams (NID) were hacked back in January by hackers probably having Chinese origin, the discovery has been made […]
The McAfee security firm found an Adobe Reader vulnerability that reveals where a PDF document is opened. The McAfee security firm found an Adobe Reader vulnerability that reveals where a PDF document is opened, once again Adobe products are the center of attention of security experts after the numerous attacks that have exploited flaws in its products for cyber espionage campaigns. […]
APWG issued the new edition of its APWG Global Phishing Survey report that identifies trends and their significance by quantifying the scope of the global phishing problem. The APWG Global Phishing Survey report analyzes phishing attacks detected in the second H2 2012, the overall data for the study was collected by the Anti-Phishing Working Group, and supplemented with […]
LivingSocial data breach exposed 50 million customer records, the news is shocking and is circulating on the Internet since last Friday. On The internet is circulating the news of the LivingSocial data breach, an incident that menace the privacy of million of users and that rekindling the debate on the level of security provided by major service companies […]
FireEye report on the evolution of sophisticated cyber threats and their diffusion on global scale FireEye security firm has published another interesting report, titled “FireEye report -The Advanced Cyber Attack Landscape”, that provides an overview of advanced cyber attack landscape, these events are a widespread global activity and during 2012. FireEye experts detected 12 million malware communications seeking instructions, […]
Critical vulnerability in Viber allow bypass security mechanisms We have discussed in various occasions of security in mobile environments, mobile device are becoming the center of our digital life, they act as a bridge between our daily existence and our identity in cyberspace. Mobile follows our movements, knows our habits and maintains a history of our interaction with our contacts, it’s clear that compromising them […]