1197 results
A vulnerability in Schneider Electric VAMPSET Software allows attackers to penetrate the system and trigger arbitrary code execution. According to the recent advisories issued by Schneider Electric and ICS – CERT, there is a vulnerability (CVE-2014-8390) that can allow hackers to penetrate the system and trigger arbitrary code execution. The vulnerability was identified and made […]
Modern maritime ships are considered a privileged target for hackers and pirates that are increasing their pressure on the Maritime Shipping Industry. Hackers target Cyber Attack on Ships: Maritime Shipping Industry at Risk Modern maritime ships are often monitored and controlled remotely from shore-based facilities thousands of miles away to ensure efficiency. This creates a […]
Iran is improving its cyber capabilities faster than experts ‘would have ever imagined’ and increased cyber-security spending 12-fold since2013. The British Business Insider published an interesting post on the Iranian cyber capabilities, according the experts the Government of Teheran is improving expertise in the cyber domain faster than experts ‘would have ever imagined’. Iran is […]
A new strain of Vawtrak malware implements capabilities to send and receive data through encrypted favicons distributed over the Tor network. A new powerful variant of the Vawtrak malware, also known as Neverquest or Snifula, appeared in the wild. Vawtrak is considered by malware researchers one of the most dangerous malicious code that is threatening systems worldwide. The […]
Thousands of routers exposed on the Internet by the ISPs are vulnerable to hacking and consequence of attacks on a large scale could be dramatic. ISPs have provided at least 700,000 ADSL routers to the public and unfortunately these kinds of routers have been really vulnerable to every possible hacker who wants to gain the […]
Findings reveal that there is a clear lack of appropriate security measures to protect drivers of a connected car against hackers. “Findings reveal that there is a clear lack of appropriate security measures to protect drivers against hackers who may be able to take control of a vehicle or against those who may wish to […]
Within the year of 2014, a lot of data was leaked and this leads to grave concerns as to the future of overall online security. Unfortunately, 2014 was one of the worst years and the reason of that was that a lot if viruses and attempts of violation of online privacy. IBM X-Force Threat Intelligence […]
The Evolution Black Market, the most popular an online black marketplace appears to have vanished, it seems that admins of the website exit scamming. The security community is paying attention to the evolution of dark markets following the operation Onymous conducted by law enforcement in November. Law enforcement in a joint effort against cybercrime seized dozens of black […]
A research conducted by experts at Symantec highlights disturbing security failures in the IoT devices present in today connected home. The purpose of IoT is connect all type of devices that we have at home, let’s say I am at my work and I want to arrive at home and have my air conditioner at […]
Data exfiltration is mechanism to data breach that occurs when an individual’s or organization’s data is illegally copied from its systems. It’s not a matter of “if” you will be attacked, but “when”. Preventing attackers from breaching our system is a necessity and stopping them before they can complete their mission is a requirement. Analyzing […]