HP publicly admitted the presence of backdoor in its StoreVirtual storage products designed to respond to the needs of virtualized environments. HP publicly admitted the presence of backdoor in its storage products, in particular the company revealed the presence of an undocumented administrative account in the product family StoreVirtual designed to respond to the needs of virtualized […]
RARSTONE is the name of the RAT (REMOTE ACCESS TOOL) used in a cyber espionage campaign dubbed “Naikon” uncovered by security experts at TrendMicro. Security experts at TrendMicro revealed to have detected the RARSTONE RAT studying targeted attacks across Asia (e.g. India, Malaysia, Singapore, and Vietnam) conducted against various companies belonging to different sectors such […]
Cybersecurity goes to the offensive, law enforcement and private companies are discussing the possibility to adopt an offensive approach to defend their assets from the continuous cyber attacks. The press is getting used to news of cyber attacks against companies and government agencies, to date, the trend of the representatives of the cybersecurity of these entities […]
Apple can “bypass the security software” if it chooses, accoring ATF no law enforcement agency could unlock a defendant’s iPhone except Apple that has created a police waiting list because of high demand. Apple is considered an impregnable fortress, the main functions provided by the iOS operating system and related data are inaccessible to ill-intentioned but […]
Securi security firm detected a new sophisticated  Apache backdoor used to hijack traffic  to malicious website serving the popular Blackhole exploit kit. Securi security firm detected a new sophisticated  Apache backdoor used to hijack traffic to malicious website serving the popular Blackhole exploit kit. The company published a blog post describing the new Apache backdoor that according […]
The charge is heavy, according to some experts, Nokia analyzes userâs traffic officially to increase performance compressing data on some of its mobile devices. According many experts the popular company is responsible of the hijacking of userâs traffic on its servers, that is the case for the Nokia Asha models, for this reason on internet […]
The news is circulating for days, the Iranian head of the national security forces , Esmail Ahmadi Moghadam, declared that low enforcement  of the country is developing a software for “smart control” of social-networking sites, the authorities have understood that the control of the powerful platforms is more important filtering. Moghadam exposed the consideration made […]
The ways explored by malware creators are unlimited, recently Symantec has announced the discovery of a new operational mode for backdoor trojan Makadocs, the security firm has in fact reported that a variant of malware hides its command-and-control (C&C) server communications using a legitimate Google Docs function. Backdoor.Makadocs is a Trojan horse that opens a […]
Last May The Iranian Computer Emergency Response Team (MAHER) detected a new targeted malware which hit the country, that has been named Flame, also known as Flamer or Skywiper, due the name of  its main attack module. MAHER wasnât the only one to detect the agent, also Kaspersky Lab and CrySyS Lab identified the new dangerous malware, recognized […]
The malware diffusion is assuming dimension difficult to control, no matter if we are facing with a state-sponsored attack or with a cyber scam, malicious agents are around us, they have infected a huge quantity of machines with dramatic consequences. But what’s happen if we discover the malware inside the controller of ordinary object that […]