Cherry Picker, a PoS Malware even more threateningCherry Picker, a PoS Malware even more threatening

Cherry Picker, a PoS Malware even more threatening

10 years ago

Researchers at Trustwave have published the analysis of the Cherry Picker threat, a point-of-sale (PoS) malware that went undetected over…

Snooping Samsung S6 calls with bogus base stationsSnooping Samsung S6 calls with bogus base stations

Snooping Samsung S6 calls with bogus base stations

10 years ago

A duo of security researchers, Daniel Komaromy of San Francisco and Nico Golde of Berlin, demonstrated how to intercept calls…

Did FBI pay the Carnegie Mellon to hack Tor?Did FBI pay the Carnegie Mellon to hack Tor?

Did FBI pay the Carnegie Mellon to hack Tor?

10 years ago

The Director of the Tor Project Roger Dingledine has accused the FBI of commissioning to the Carnegie Mellon boffins a…

Android Tablets with Pre-loaded Cloudsota malware sold on AmazonAndroid Tablets with Pre-loaded Cloudsota malware sold on Amazon

Android Tablets with Pre-loaded Cloudsota malware sold on Amazon

10 years ago

Experts at Cheetah Mobile are warning about Android Tablet pre-loaded with Cloudsota Trojan sold on Amazon and other online stores.…

Drone regulation – Keeping the skies safe from commercial dronesDrone regulation – Keeping the skies safe from commercial drones

Drone regulation – Keeping the skies safe from commercial drones

10 years ago

My participation at the World Insight on CCTV discussing the Federal Aviation Administration regulation for the commercial  drones. Q1 First…

Ransomware infected the UK Parliament’s computer networksRansomware infected the UK Parliament’s computer networks

Ransomware infected the UK Parliament’s computer networks

10 years ago

A ransomware infected several PC at the UK Parliament, for the first time a threat hit the internal computer network,…

88 percent of company networks vulnerable to privileged account hacks88 percent of company networks vulnerable to privileged account hacks

88 percent of company networks vulnerable to privileged account hacks

10 years ago

A research published by CyberArk Labs focuses on targeted attacks against organizational networks, analyzing hackers' methods, tools and techniques. Bad…

What You Should Know about Triangulation Fraud and eBayWhat You Should Know about Triangulation Fraud and eBay

What You Should Know about Triangulation Fraud and eBay

10 years ago

The increasing phenomenon of triangulation fraud on eBay has led to a published analysis on behalf of the company, as…

GCHQ and NCA hunting criminals in the dark webGCHQ and NCA hunting criminals in the dark web

GCHQ and NCA hunting criminals in the dark web

10 years ago

The GCHQ and NCA join forces to fight online criminals in the Dark Web and formed a new unit called…

Three men charged for the attack on the JPMorgan ChaseThree men charged for the attack on the JPMorgan Chase

Three men charged for the attack on the JPMorgan Chase

10 years ago

U.S. Authorities have charged other three men in huge cyber fraud targeting JPMorgan, and at least another nine financial institutions.…