1198 results
The Obama Administration will assign the command of NSA to Michael S. Rogers, the US Government has chosen a military Expert on Information Warfare. The Obama Administration will assign the command of NSA to Michael S. Rogers, presently the U.S Navy’s Cyber Security Chief, will be the new Director of the National Security Agency (NSA) and […]
Symantec published in the report titled “Targeted Attacks Against the Energy Sector” to describe the security landscape for companies of the sector. Companies and industries belonging in the energy sector are waiting most targeted sectors on a global scale, Symantec has issued a very interesting report titled “Targeted Attacks Against the Energy Sector” that provide […]
Kaspersky experts discovered a java version of icefog espionage campaign that targeted at least 3 us oil, gas companies spreading a backdoor dubbed Javafog. Kaspersky Lab in September 2013 announced to have discovered Icefog team, an emerging group of cyber-mercenaries available for hire to conduct surgical hit and run operations against strategic targets. The cyber […]
If you desire to read the details on each of the above components and discover how NSA used it please read my article at Infosec Institute “How the NSA Monitors Target Computers with Radar Wave Devices” Introduction Germany’s Der Spiegel has published a couple of disturbing articles on the NSA surveillance activities. The media agency has focused its articles on […]
One of the largest communities of Eastern Europe cybercriminals “Verified” was hacked, more than 18,894 bad actors revealed after several hours. According to sources at IntelCrawler, cyberintelligence firm from Los Angeles, the largest community of Eastern Europe cybercriminals “Verified” was hacked several hours ago. The hackers hit the online community stealing member information and […]
Leaked documents shared by Der Spiegel show how NSA spyware codenamed DROPOUTJEEP can spy on every Apple iPhone. Apple denies any claim. Users buy the iPhone, NSA controls them. This is not a slogan for the last Apple advertising, it is the uncomfortable truth revealed by another set of NSA documents leaked by Snowden and […]
Microsoft Security Intelligence Report states the malware encounter rate in Turkey is far greater than that of any other country in the entire world. The Microsoft Security Intelligence Report (SIR) is a periodic study of the threat landscape of exploits, vulnerabilities, and malware. It is based on data from Internet services and over 600 million […]
The hackers behind Target data breach are selling stolen card data including localization info. Why? In numerous posts I have highlighted the possibility to acquire stolen card data on the black market, different website on the underground and within the Deep Web proposed the precious commodities at varying prices depending on several factors like, the […]
KrebsOnSecurity has discovered an unusual botnet that disguises itself as a legitimate add-on for Mozilla Firefox to perform website vulnerability scanning. Krebson security blog posted an interesting article on a new concerning botnet infected more than 12,500 systems disguises itself as a legitimate add-on for Mozilla Firefox to hack websites on a large scale. The botnet, […]
Interview with the security experts Andrey Komarov and Dan Clements of IntelCrawler to analyze significant evolutions in the cyber-threat landscape. Today I desire to propose an interview with Andrey Komarov, CEO of IntelCrawler and Dan Clements, President of IntelCrawler. IntelCrawler is a multi-tier intelligence aggregator, which gathers information and cyber prints from a starting big […]