Beware, even things on Amazon come with embedded malware… this is the disconcerting discovery made by the expert Mark Olsen. The security expert Mike Olsen warned about the presence of malware in products sold through the Amazon service. Olsen was searching for outdoor surveillance cameras on Amazon for a friend’s home. He has found an interesting offer […]
Android Gazon malware redirects a potential victim to a webpage that promises an Amazon gift card if you install an APK file hosted on the page. There is a new piece of malware called “Gazon”, and according to “adaptivemobile” already 4000 android users are infected. “Gazon” was discovered on 25 of February and until yesterday […]
The experts at IBM have found several problems in implementation of the social login authentication of several identity providers. The researchers at IBM’s X Force security discovered a way to gain access to Web accounts by exploiting misconfiguration in some social login services. Social login, also known as social single sign-in, is a form of single […]
Security experts at AppRiver firm uncovered Malicious Amazon phishing emails that aim to infect Holiday Shoppers in the U.S. and U.K. Researchers at AppRiver firm reported that cyber criminals are targeting holiday shoppers at Amazon UK with large a scale phishing campaign, which is spreading malicious emails. The emails sent by crooks include malicious Microsoft Word documents […]
Two security experts will present at the next BlackHat conference how to exploit cloud services to build Money-Mining Botnet. Cloud computing is becoming the paradigm most abused by cybercrime, cloud architectures represent privileged targets of cyber criminals that desire to steal data they contain or to abuse their resources to conduct cyber attacks. Two researchers, Rob […]
Hosting service Code Spaces goes out of business due to a cyber attack after an attempt of extortion by a gang of cyber criminals. Code Spaces, a code-hosting and software collaboration platform, has been brought down by a serious cyber attack which has caused its out of business, the attackers have deleted the data and […]
Researchers at Sensepoint have realized a software that could be used to turn a drone in a perfect spying machine able to steal data from mobile devices. The rapid diffusion of drones for civil uses raises serious security issues, we discussed in the past the risks related to hacking of so powerful machines, but there is […]
Solutionary security firm published SERT Q4 2013 Threat Intelligence Report to provide an overview of the overall threat landscape. Recently Solutionary security firm published SERT Q4 2013 Threat Intelligence Report to provide an overview of the overall threat landscape, the document is the result of a research conducted over the last three months correlating events across devices […]
Amazon announced the use of unmanned drones for Civilian purposes, Samy Kamkar has demonstrated how to build your UAV “Killer drone” to hijack them. Amazon company, the world’s largest online retailer, has recently announced that it is testing unmanned drones to deliver products ordered by the customers, the service could take up to five years […]
True, sometimes the big discoveries are the daughters of the case. That’s what happened to Panos Ipeirotis, a researcher of the New York University, he has discovered a new technique of attack on his Amazon web service using Google Spreadsheets. The methods of attack is a DDoS type and the researcher has named it as Denial of […]