Amazon

Be careful products sold on Amazon are infected with malware

Beware, even things on Amazon come with embedded malware… this is the disconcerting discovery made by the expert Mark Olsen.…

8 years ago

Worm Gazon, fake Amazon gift card is targeting Android users

Android Gazon malware redirects a potential victim to a webpage that promises an Amazon gift card if you install an…

9 years ago

SpoofedMe attacks exploit popular websites social login flaws

The experts at IBM have found several problems in implementation of the social login authentication of several identity providers. The…

9 years ago

Amazon phishing campaign aim to infect Holiday shoppers

Security experts at AppRiver firm uncovered Malicious Amazon phishing emails that aim to infect Holiday Shoppers in the U.S. and…

9 years ago

Hackers exploit cloud services to build Money-Mining Botnet

Two security experts will present at the next BlackHat conference how to exploit cloud services to build Money-Mining Botnet. Cloud…

10 years ago

Hosting service Code Spaces goes out of business due a cyber attack

Hosting service Code Spaces goes out of business due to a cyber attack after an attempt of extortion by a…

10 years ago

Snoopy software can turn a drone is a data stealer

Researchers at Sensepoint have realized a software that could be used to turn a drone in a perfect spying machine…

10 years ago

SERT Q4 2013 Threat Intelligence Report on threat landscape evolution

Solutionary security firm published SERT Q4 2013 Threat Intelligence Report to provide an overview of the overall threat landscape. Recently…

10 years ago

Amazon opens civilian use of drones, I hack them

Amazon announced the use of unmanned drones for Civilian purposes, Samy Kamkar has demonstrated how to build your UAV "Killer…

10 years ago

Google used as cyber weapon. New attack method found

True, sometimes the big discoveries are the daughters of the case. That's what happened to Panos Ipeirotis, a researcher of…

12 years ago

This website uses cookies.