A group of researchers discovered a series of 6 vulnerabilities, dubbed Pileup flaws, in Android PMS that exposes more than 1 Billion Google-based devices. Android is the mobile OS that most of all attracts cyber criminals due its capillary diffusion, recently security experts have discovered new malware families targeting the platform and hackers have found numerous vulnerabilities […]
FireEye experts investigating on a spear-phishing campaign on an US-based financial institution discovered that common WinSpy RAT was adapted to hit Android devices. FireEye Security Researchers have recently identified a new variant of Winspy RAT that can infect users’ PC and also their Android Devices during synchronization operations. We have a long discussed about the increment for […]
Symantec experts recently came across a Windows malicious code that attempts to infect connected Android devices serving an Android malware. Researchers at Symantec antivirus firm have discovered a malicious code that is able to infect Android mobile device with a banking malware during synchronization. The Android malware that was designed to hit Windows user could compromise user’s Smartphone during file […]
Microsoft Security Intelligence Report states the malware encounter rate in Turkey is far greater than that of any other country in the entire world. The Microsoft Security Intelligence Report (SIR) is a periodic study of the threat landscape of exploits, vulnerabilities, and malware. It is based on data from Internet services and over 600 million […]
Security experts at Trend Micro detected a new variant of AutoCAD Malware that leaves victims hackable for further cyber attacks. Malware researchers at Trend Micro spotted AutoCAD Malware codenamed ACM_SHENZ.A. It’s not first time that a malware was specifically designed to steal AutoCAD project, last years security specialists at ESET detected a malicious code dubbed […]
An interesting post by Brian Krebs is food for thought on the business behind a cashout service for cybercriminals. Brian Krebs has recently published an interesting post on his KrebsOnSecurity blog regarding the way cyber criminals cashout their money through a dedicated cashout service. The conversion of ill-gotten gains into cash, The âCashoutâ, is considered most risky […]
Read about APT attacks has become customary, even easier to hear of attacks against political dissidents or minorities as Tibetan and Uyghur activists, but never before has been exploited the Android platform for this type of offensive. In the past Tibetan minorities have been already targeted with malware able to infect Windows and Mac OSs, […]
The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we tend to associate a terrorist act to a physical event as an explosion, a conflict, a tragedy, but the common people totally ignore the potential threat of a cyber offensive. We learned about the devastating […]