The experts at the IT Department of the EU parliament bans the Microsoft mobile Outlook app due to the recently disclosed privacy and security issues. A few day ago I wrote about serious security issues for day ago I wrote about serious security issues for Microsoft mobile Outlook app, the researcher and Head of Development at midpoints […]
Three German students have discovered that tens of thousands of MongoDB databases running as a service or website backend were exposed on the Internet. MongoDB is a cross-platform document-oriented database which uses JSON-like documents with dynamic schemas (BSON) improving the integration of data between different applications. MongoDB is very popular for scalability, performance and high availability, it represents […]
Security researchers discovered how to install and launch malicious applications remotely on Android devices exploiting two flaws. Security researchers have uncovered a couple of vulnerabilities in the Google Play Store that could allow cyber criminals to install and launch malicious apps remotely on Android mobile devices. The expert Tod Beardsley, technical lead for the Metasploit […]
An Indian security expert Laxman Muthiyah exploited a vulnerability in Facebook Graph API mechanism to delete Facebook photo albums of every user. A critical flaw in the popular social network Facebook recently discovered could allow ill-intentioned to completely delete users’ Facebook photo album without being authenticated. According the security expert Laxman Muthiyah the vulnerability resides […]
Which is the cost of personal data in the criminal underground? How cyber criminals steal personal data? Which is the cashout process? What is the underground economy? Put simply, the underground economy is a collection of forums, chat rooms and custom-made websites that are all designed to facilitate, streamline and industrialize cybercrime. It’s within these […]
Security experts at Invincea and iSIGHT Partners uncovered a hacking campaign that used two distinct zero-day flaws to compromise Forbes.com website. Security experts at Invincea and iSIGHT Partners in a joint investigation tried to profile a Chinese APT group that used two distinct zero-day flaws to compromise Forbes.com website. The intent of the group was to […]
Researchers from Trend Micro discovered that unknown hackers have compromised  Gas Pump Monitoring Systems in the US … it’s security emergency. Researchers at Trend Micro and many other security firms have observed a significant increase in the number of cyber attacks against systems in oil and energy industries. Another worrying trend observed by the experts is […]
WhatsSpy Public is a web-based tool that could allow an attacker to access Whatsapp user information related to his activity. WhatsSpy Public is a web-based tool created by Maikel Zweerink that can trace the moves of a WhatsApp user. WhatsSpy is able to display user information in a friendly dashboard that includes events being displayed […]
Researchers at Veracode discovered that nearly 41% of enterprise applications using GNU C Library employ the Ghost-ridden ‘gethostbyname’ function. GNU C Library (glibc) vulnerability, named as the GHOST vulnerability, was released by Qualys Guard on 27th January 2015. Severity of this vulnerability is “CRITICAL” and listed in CVE database as CVE-2015-0235. Vulnerability is termed as […]
Samsung SmartTV transmits data to a third party, be aware that if your spoken words include personal or other sensitive information. We have discussed several times about the privacy and security issues related to the Internet of Things devices, Smart meters and Smart TV are intelligent devices that could be exploited by hackers to collect our sensitive […]