A Study that will be presented at the USENIX Security Symposium shows that principal Dark marketplaces raked from $300,000 to $500,000 a day. We all remind the operation Onymous and the seizure of several black markets operated by law enforcement last year, despite the enormous effort spent every day by the authorities the illicit activities […]
MWR Labs have disclosed information on an unpatched vulnerability that allows an attacker to easily bypass the Android sandbox. Other problems for the popular Android OS, after the discovery of the Stagefright vulnerabilities and other security flaws recently revealed by security researchers, now experts at MWR Labs have disclosed information on an unpatched vulnerability that allows […]
US authorities have identified and arrested members of an international ring of hackers and stock traders specialized in the theft of trading info. The Department of Justice charged a group of nine hackers and stock traders in a criminal conspiracy with making more than $30 million in illegal trades based on exfiltrated data. At the […]
Chinese computer manufacturers Lenovo has been caught once again using a hidden Windows feature to preinstall unwanted and unremovable rootkit. Lenovo firm was accused several times to supplying equipment for networks of the intelligence and defense services various countries that allowed the Chinese Government to run espionage operations. In 2013, Spy agencies reportedly have a long-standing […]
Carphone Warehouse disclosed a sophisticated attack that may have impacted more than 2.4 million customers. Attackers covered the breach with DDoS attacks. On Saturday Carphone Warehouse (CW) was reportedly swamped by hackers than may have accessed personal and financial details of around 2.4 million customers according to the mobile retailer. The data breach affects customers […]
Microsoft announced in the Tuesday’s bulletin that crooks have been exploiting a vulnerability that allows to execute malicious code using booby-trapped USB Microsoft announced in the last Tuesday’s bulletin that crooks have been exploiting a vulnerability that allows to execute malicious code using booby-trapped USB. The vulnerability affects all supported versions of Windows OS as […]
A security flaw in the Facebook API allows hackers to decrypt and scan user IDs, nearly 1.44 billion Facebook users are at risk of identity theft. The security researcher Reza Moaiandin, Technical Director at Salt Agency, discovered a flaw in Facebook’s API that can allow hackers to scan for user ID, and that leaves about […]
Security experts at Kaspersky Lab recently observed a big wave of malicious VBE files targeting Brazilian users to distribute Financial Trojan. Recently security experts have seen old tricks rising from the dead (like for example word/excel macros attachment in e-mails) and malicious VBE files are being spread via email targeting Brazilian users. These VBE files […]
A new hacking machine is available in the arsenal of hackers it is an Aerial Assault drone that is able to automatically crack into wireless networks. David Jordan of US-based Aerial Assault presented was the Def Con conference an assault drone equipped with hacking tools. The vehicle could be used in hacking missions, for example by […]
Two security experts at the last Def Con hacking conference have demonstrated how Internal LTE/3G modems can be hacked to help malware survive OS reinstalls Many users totally ignore that LTE/3G modems built into new business laptops and tablets have a dedicated processor and operating system that could be exploited by threat actors to maintain persistent […]