1196 results
TrapX, a renowned security providing delivery of deception based cybersecurity defense uncovered a security flaw in medical field dubbed as medical device hijack, or simply put MEDIJACk. The flaw can allow attackers to exploit main healthcare systems by breaking into the unpatched and outdated medical devices. Let it be Anthem hack or CareFirst BlueCross BlueShield, this year has […]
Security experts developed their PunkSPIDER, a Tor crawler, that already scanned more than 7000 domains and discovered numerous vulnerabilities. We have discussed several times about the Tor anonymizer network and the way it is exploited by criminal crews to sell any kind of illegal product and service. Last week, an automated scanner dubbed PunkSPIDER was launched in the […]
A quick tour in the Black Markets, the places on the web where it is possible to acquire or rent “malicious” services and illegal products. Black Markets are places on the web where it is possible to acquire or rent “malicious” services and products, these markets are growing fast and are becoming very popular in […]
The FBI warned lawmakers there was no way to monitor encrypted online communications among sympathizers of the ISIS, it urges a law to give them more powers. The FBI warned lawmakers there was no way to monitor encrypted online communications exploited by Islamic State militants and sympathizers. The law enforcement urges IT giants to provide […]
D-Link NAS and NVR products discovered with serious security bugs, users are advised to apply the patches immediately, if they have any available to them. A Hungry based security test company specializing in embedded systems, named SEARCH-LAB, has found D-Link’s NAS (Network Attached Storage) and NVR (Network Video Recorder) products having over 50 vulnerabilities. A […]
A High-profile defector warns of that North Korea’s cyber army has the capability to run cyber attacks that could cause loss of human lives. Digital life and real existence increasingly overlap, cyber weapons are proof of that a threat originating from cyberspace can cause real and tangible damage as the loss of human lives. The BBC published […]
The recent report from ISTR has outlined the fact that zero-day vulnerabilities remain unresolved for 59 days. What you can do for online protection. Symantec and the recently published Internet Security Threat Report (ISTR) have made a truly frustrating revelation as to the time period, in which zero-day threats remain undetected. Whereas in 2013 this time […]
McAfee discovered in the Deep Web a ransomware-construction kits that allow easy to build malware in just 3 steps, implementing an interesting model of sale. In the criminal underground it is easy to find malware-construction kits that allow easy to build malicious code from existing templates and in same cases starting from legitimate applications. A […]
Panda Security firm released a report regarding a hacking campaign dubbed “Operation Oil Tanker: The Phantom Menace” that targeted oil tankers. Security researchers at Panda Security have released a report on a hacking campaign dubbed “Operation Oil Tanker: The Phantom Menace” that targeted oil tankers. According to Panda Security the attacks on oil cargos began in August […]
A team of security researchers announced to have developed Astoria, a new Tor client designed to beat the NSA and reduce the efficiency of timing attacks. Tor and Deep web are becoming terms even popular among Internet users, the use of anonymizing network is constantly increasing for this reason intelligence agencies are focusing their efforts in its monitoring. […]