Adobe with a week of delay on the roadmap has released security updates to fix critical vulnerabilities in Acrobat and Reader PDF. Adobe has finally released critical security updates for its products Reader and Acrobat PDF software. The vulnerabilities fixed with these updates have been targeted by hackers in numerous cyber attacks worldwide. The security updates […]
Intego Malware Research Team discovered that OSX Flashback trojan is still active with sinkholing activity. Mac users must be aware. Flashback Trojan is a cyber threat known since 2011, it is a trojan horse that targeted a Java vulnerability on Mac OS X machines, early 2012 it spread to infect up to 600,000 machines as […]
The European Network and Information Security Agency (ENISA) is the EUâs agency responsible for cyber security issues of the European Union, its last report âENISA Threat Landscape – Responding to the Evolving Threat Environmentâ, summarizing the principal threats and providing also useful indication on the emerging trends. The report proposes the list of top threats […]
Social networks are platforms that have monopolized majority of userâs internet experience, the imperative is to âsocialâ, and everybody share an incredible amount of personal information exposing its digital identity to serious risks. An element of attraction for cyber criminals is the huge number of services, from gaming to payments, that are developing on these […]
In today’s society technology plays a crucial role and is used as a new cultural vehicle, and even aggregation element or carrier to express dissent against the policies of governments and private companies. Groups such as Anonymous are maximum expression of a phenomenon defined “Hacktivism” that refers the usage of computers and computer networks […]
Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 05 2012. The article offers an overview on cyber security issues relating to sports events, competitions that are a priority target for terrorists and cyber criminals. What weight has the information security component on the overall organization? An analysis of the main types of computer attacks and possible consequences in a highly critical contest such as a sporting event. Introduction Whenever we see a major sporting event we […]