Vawtrak v2, a close look at the cybercriminal groups behind the threatVawtrak v2, a close look at the cybercriminal groups behind the threat

Vawtrak v2, a close look at the cybercriminal groups behind the threat

9 years ago

Security experts from the cyber threat intelligence firm Blueliv have published a report on the banking Trojan Vawtrak v2 its…

Boffins analyzed EXIF metadata in photos on principal blackmarketsBoffins analyzed EXIF metadata in photos on principal blackmarkets

Boffins analyzed EXIF metadata in photos on principal blackmarkets

9 years ago

Two researchers have analyzed images Exif metadata included in the photos used by crooks to advertise their products on black…

CVE-2016-6415 – CISCO confirms a new Zero-Day linked to Equation Group hackCVE-2016-6415 – CISCO confirms a new Zero-Day linked to Equation Group hack

CVE-2016-6415 – CISCO confirms a new Zero-Day linked to Equation Group hack

9 years ago

Cisco revealed the existence of another zero-day vulnerability, tracked as CVE-2016-6415, in the Equation Group archive leaked by the Shadow…

NIST issues the Baldrige Cybersecurity Excellence Builder cybersecurity self-assessment toolNIST issues the Baldrige Cybersecurity Excellence Builder cybersecurity self-assessment tool

NIST issues the Baldrige Cybersecurity Excellence Builder cybersecurity self-assessment tool

9 years ago

The National Institute of Standards and Technology (NIST) has issued a draft of a self-assessment tool named Baldrige Cybersecurity Excellence…

Hacking industrial processes with and undetectable PLC RootkitHacking industrial processes with and undetectable PLC Rootkit

Hacking industrial processes with and undetectable PLC Rootkit

9 years ago

Two security researchers have developed an undetectable PLC rootkit that will present at the upcoming Black Hat Europe 2016. The…

Mozilla will fix the cross-platform RCE flaw that threatened Tor anonymityMozilla will fix the cross-platform RCE flaw that threatened Tor anonymity

Mozilla will fix the cross-platform RCE flaw that threatened Tor anonymity

9 years ago

Mozilla plans to fix the cross-platform RCE flaw that threatened Tor anonymity. The flaw affects certificate pinning protections implemented by…

Security Affairs newsletter Round 78 – News of the weekSecurity Affairs newsletter Round 78 – News of the week

Security Affairs newsletter Round 78 – News of the week

9 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

GCHQ plans to protect the country with a national firewallGCHQ plans to protect the country with a national firewall

GCHQ plans to protect the country with a national firewall

9 years ago

The British intelligence agency GCHQ is planning to create to protect the country from cyber attacks by creating a national firewall.…

Hacking Facebook pages? Hackers demonstrated how to do it in 10 secsHacking Facebook pages? Hackers demonstrated how to do it in 10 secs

Hacking Facebook pages? Hackers demonstrated how to do it in 10 secs

9 years ago

Hacking Facebook - An Indian researcher discovered a critical vulnerability in the Facebook business manager that could be exploited to…

Researchers discovered security flaws in the Android version of Signal appResearchers discovered security flaws in the Android version of Signal app

Researchers discovered security flaws in the Android version of Signal app

9 years ago

The security duo Markus Vervier and Jean-Philippe Aumasson have discovered multiple flaws in the Android version the popular Signal app.…