Researchers at MalwareMustDie group have discovered a KINS Malware builder leaked online, it is easy to predict a rapid diffusion of the banking trojan. Security experts at the MalwareMustDie revealed that the source code of the popular KINS malware was leaked online. Early 2013, experts at RSA discovered traces the banking trojan named KINS by analyzing the offer for […]
The New Zealand’s Government passed the Harmful Digital Communications Bill, which declares war to cyberbullying and other abuses of Digital Communications. The Government of New Zealand has passed the Harmful Digital Communications Bill that would implement the Government’s decisions on addressing harmful digital communications. The Bill establishes serious penalties against cyberbullying considering it as a serious criminal offense. The Bill states that any […]
Trend Micro has identified Lordfenix, a student that created more than 100 different banking Trojans and other malicious tools, since April 2013. Security experts at Trend Micro have identified a 20-year-old Brazilian student which has developed and distributed more than 100 Banking malware. The young cyber criminal, which used the pseudonym of ‘Lordfenix’, ‘Hacker’s Son’ and […]
Security researcher discovered a strain of the Kovter trojan that has been updating Flash Player and Internet Explorer to prevent further infections. The French security expert Kafeine have discovered a new strain of the Kovter malware noticing that the instance of the malicious code he was analyzing was attempting to download the latest version of the Flash […]
FBI has published the lists of most wanted hackers, the rewards for their capture reach $4.2 million. They have stolen hundreds of millions of dollars. Cybercrime represents one of the most serious threat to Governments and private industries worldwide, law enforcement hunt down this emerging class of criminals who are able to influence the social […]
The OPM announced that it has temporarily suspended its Electronic Questionnaires for Investigations Processing (e-QIP) system to fix a security flaw. According the results of a security audit conducted after the hack at the US Office of Personnel Management (OPM) the systems of the US Department are affected by a serious vulnerability. The vulnerable system is […]
Recorded Future discovered that credentials stolen in a number of breaches and belonging to government agencies are available online on several paste sites. According to analysts at Recorded Future, the credentials stolen in several data breached related to 100 US government domains are available online on a number of paste sites and on other websites. […]
The customers of popular travel websites are targeted by phishing scam in an attempt to lure them into disclosing personal information. The users of popular travel websites are targeted by phishing campaigns in an attempt to lure them into disclosing personal information. The travel websites have issued an alert to inform their customers of fraudulent […]
Security experts have discovered the availability in underground forums of the credentials and other information related to SCADA systems. SCADA (Supervisory Control and Data Acquisitions) systems are the most important components for the control of processes inside a critical infrastructure. A recent report published by Dell revealed a 100 percent increase in the number of attacks on […]
The law enforcement agencies from six European countries coordinated by the Europol have arrested members of a Ukrainian ring behind Zeus and SpyEye botnets. The law enforcement agencies from six European countries have dealt a serious blow to the organized crime by taking down a Ukrainian ring suspected of developing managing the popular Zeus and […]