Danco Danchev profiled a new TDoS product sold in underground based on 3G USB modem/GSM/SIM card, cybercrime is increasing its interest in such attacks. When I desire to explore new DIY (Do It Yourself) tools I always refer Dancho Danchev, one of the most skilled experts of cybercrime ecosystem and underground market. Today I desire […]
Kaspersky experts discovered a java version of icefog espionage campaign that targeted at least 3 us oil, gas companies spreading a backdoor dubbed Javafog. Kaspersky Lab in September 2013 announced to have discovered Icefog team, an emerging group of cyber-mercenaries available for hire to conduct surgical hit and run operations against strategic targets. The cyber […]
Internet of Things, a business growing at a compound annual rate of 7,9%, which are the principal cyber threats to the popular paradigm? Another week is starting and this morning the topic that I’ve found everywhere is Internet of Things (IoT), it is a growing paradigm that will influence our life in the next future, […]
A default setting in Asus Routers allows an attacker to remotely access data archived on a USB media storage connected to the devices. Swedish users reported an alleged vulnerability in Asus Routers that allows an attacker to remotely access data archived on a USB media storage directly connected to the devices. Asus and many routers […]
Cisco confirmed the presence of a Backdoor that affects small business devices. The flaw was discovered by the French hacker Eloi Vanderbeken weeks ago. Cisco has recently disclosed (Advisory ID: cisco-sa-20140110-sbd) the presence of a backdoor in different small business networking devices, it is an undocumented Test Interface that could be exploited by attackers to […]
Neiman Marcus retailer confirmed a data breach, it is the second case in a few weeks after data breach at US retailer Target discovered Brian Krebs. The high-end retailer Neiman Marcus confirmed a data breach that could represent a risk its customers, the incident occurs a few weeks after the clamorous data breach at US […]
If you desire to read the details on each of the above components and discover how NSA used it please read my article at Infosec Institute “How the NSA Monitors Target Computers with Radar Wave Devices” Introduction Germany’s Der Spiegel has published a couple of disturbing articles on the NSA surveillance activities. The media agency has focused its articles on […]
Microsoft hacked by the Syrian Electronic Army for a second time in 2014, MSFTNews Twitter account hijacked, sends out SEA messages. Again Syrian Electronic Army, the popular group of Hackers this time hacked the Microsoft News Twitter account — @MSFTNews. The Syrian Electronic Army (SEA) has compromised early 2014 the Skype‘s Twitter account and blog to protest […]
The giant US retailer Target announces that the extent of the credit-card leak was even bigger, further 70 million customers are victims of the data breach. We all remember the holiday attack against the US giant retail Target, a data breach that exposed millions of customers’ data. The attackers accessed to names, mailing addresses, phone […]
Which is the perception of cyberwarfare in the US Government and within the American population? How much cost Information warfare to the US citizens? In this post I desire to put together a series of useful information to better understand the perception of cyber threats on both US Government and population. Cyberwarfare is considerable today […]