Security Experts at Cheetah Mobile have uncovered a new scam based on a fake Facebook Color Changer App which infected 10000 users worldwide. Facebook  is a privileged target for cyber criminals, in many cases old fraud schema are proposed again by bad actors, it is the case of the bogus Facebook “Color Changer” app. Researchers at China-based Internet company […]
Researchers at Dell SecureWorks Counter Threat Unit discovered a theft of Bitcoin made hijacking networks of at least 19 Internet service providers. With the rise of Bitcon value has increased the interest of cybercrime, since now we have read of botnet able to mine virtual currency with victim’s resources and malicious codes able to steal Bitcoin […]
Experts at GData discovered Poweliks, a persistent malware able to infect machines without installing any files on the targeted machine. Researchers at GData software have discovered a new surprising strain of malware named Poweliks which is able to infect systems and steals data without installing any file onto the victim’s machine. This malware maintains persistence storing its components […]
The popular expert Nir Goldshlager has discovered an XMLRPC vulnerability which affects millions WordPress and Drupal websites exposing them to DoS Attack. If your website is based a WordPress or Drupal CMS you need to urgently update it to the last version released due to the presence of a critical vulnerability in the implementation of […]
A report disclosed by Wired suggests that the FBI is using a malware to identify Tor users by infecting machines on a large scale. It’s not a mystery that usage of the Tor network represents a problem for investigators of law enforcement agencies and for government entities that need to track users on the popular anonymizing network. […]
Experts at Hold Security firm discovered a Russian group of hackers that collected 1.2B stolen credentials obtained in different data breaches worldwide. Experts at Hold Security revealed to have discovered the biggest database of stolen user names and passwords and email addresses, the news is reported by The New York Times that hired an independent security expert who verified […]
A Security researcher has discovered a new flaw in the two-factor authentication process implemented by PayPal to protect its users. Security researcher Joshua Rogers has discovered a simple way of bypassing the two-factor authentication mechanism implemented by PayPal to protect accounts that are linked to eBay accounts. The flaw resides in the login process when a user is prompted […]
Cyber security expert claims to be able access satellite communications equipment on passenger jets through their WiFi and in-flight entertainment systems. Airplanes Can Be Hacked Through Wireless In-flight Entertainment System, this is not a new discovery as I explained in a post published more that one year ago and titled “Cyber Threats against the Aviation […]
China has excluded Symantec Corp and Kaspersky Lab from a list of approved antivirus software suppliers to limit the use of foreign technology. Cyber espionage is the first concern of government, China and US exchanged in the months reciprocal accusations on a series of hacking campaign conducted with the purpose of stealing sensitive information. According to the People’s Daily […]
Security researchers have discovered that billions mobile devices could be remotely controlled due the presence of a built-in management tool. Two researchers at Accuvant Labs, Mathew Solnik and Marc Blanchou, have recently discovered the existence of built-in vulnerabilities in a large number of mobile devices that would allow an attacker to gain complete control of […]