1044 results
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Just a unicode string of 13 characters to crash Mac Chrome tab Chrome, Firefox, Safari and IE – All Browsers Hacked at Pwn2Own Competition PoSeidon the most sophisticated PoS […]
The Evolution Black Market, the most popular an online black marketplace appears to have vanished, it seems that admins of the website exit scamming. The security community is paying attention to the evolution of dark markets following the operation Onymous conducted by law enforcement in November. Law enforcement in a joint effort against cybercrime seized dozens of black […]
TeslaCrypt is a new strain of ransomware, spotted in the wild by experts at Emsisoft, which is also targeting users of principal gaming platforms. A new strain of ransomware dubber TeslaCrypt was spotted in the wild by the researchers at the security firm Emsisoft. TeslaCrypt was discovered at the end of February, researchers at Bromium that analyzed the […]
The Eu plans for a new European counter-terrorism unit that will tackle extremists online in a joint effort of law enforcement from various states. Terrorists are exploiting the web for propaganda purpose and to menace the Western infidels for this reason intelligence agencies and law enforcement need to increase their efforts to tackle any kind of extremist […]
A number of Western websites were hacked over the weekend, the sites were defaced with messages claiming the ISIS as the responsible. The FBI is investigating a series of cyber attacks occurred over the weekend on several western websites, the authorities suspect the involvement of hackers linked to the ISIS. The list of hacked websites includes […]
Security firm Digital Shadows has realized a search engine for the Deep Web that according the company CEO “sucks in pages in real time”. The deep web is the part of the world wide web not indexed by common search engines, it represents almost all of the content available on the Internet. Law enforcement, intelligence […]
Security firms discovered a significant increase in the number of targeted attacks aimed at stealing the code related trading algorithms. Cyber criminal organizations appear more interested in target trading algorithms, patents, trade secrets than other kinds of information, this is the new trend observed by security experts. Cyber criminals are increasing their activity against private […]
The McAfee Labs Threat Report: February 2015 analyzes security level of mobile apps and the evolution of principal cyber threats. Last year the Carnegie Mellon University’s Computer Emergency Response Team (CERT) analyzed the level of security implemented by Android applications, in particular the experts focused their investigation on Android applications that failed to properly validate SSL certificates. The […]
The Lenovo computer company knowingly shipped laptops with pre-installed Superfish malware. And ‘controversy on the web, users are outraged. Lenovo is in the storm one again, security experts discovered that the company is shipping laptops with Superfish malware , a malware that allows to steal web traffic using man-in-the-middle attacks. SuperFish is considered by many antivirus companies as […]
How cyber criminals use several phishing kits to run malicious campaigns and which is the economy behind this category of attacks? Most of the major banks and companies that suffer this type of attacks make people aware of phishing, but despite the high level of awareness of the threat, the phenomenon does not slow down, indeed seems to accelerate […]