A security expert defined a new attack technique dubbed Reflected File Download that allows to serve a ‘Zero-Day’ Worm without possibility of defense. The security expert Oren Hafif has invented a new attack technique dubbed Reflected File Download (RFD) that could be adopted to hack victim’s computer when he tries and logs in to popular and trusted website like Google and […]
China calls for stronger cybersecurity to respond the aggressive cyber-war conducted against its systems by Western countries. It’s not a mystery, China is within those countries that most of all are investing to improve cyber capabilities and strengthen its leadership in the cyber space. According to state media broadcasters Chinese Government will continue to invest to […]
Experts at Radware DDoS protection solution provider recently have discovered a new form of DDoS attack they dubbed “Tsunami SYN Flood Attack.” Radware DDoS protection solution provider recently discovered a new category of distributed denial-of-service (DDoS) attack, according the experts of the company it is a type of SYN flood dubbed “Tsunami SYN Flood Attack.” In just 48-hour period […]
A man has published on PasteBin a fake dump of the database of the popular website KrebOnSecurity managed by the expert Brian Krebs. A few hours ago I received a tweet from the account Narcochaos (@N4rCochaos ) , which informed me and other illustrious colleagues that he has hacked the website of the popular security investigator Brian Krebs (http://krebsonsecurity.com/). […]
The Snappening, hundreds of thousands of unaware users have had their personal Snapchat photos and videos public disclosed by hackers. The Fappening is considered my mass media one of most interesting case of privacy violation, four archives containing a numerous celebrities nude photos have been released in the last weeks … and many experts sustain that the […]
An Authentication vulnerability in PayPal mobile API, discovered more than one year ago, allows access to restricted Accounts. Another authentication flaw affects PayPal mobile API, an attacker exploiting it could gain access to Blocked Accounts. The authentication restriction bypass vulnerability, resides in the mobile API authentication procedure of the PayPal online-service, according to Vulnerability Laboratory […]
The experts at The Malware Must Die detected numerous attack worldwide exploiting the Bash Bug flaw to spread the Mayhem botnet. The researchers at Malware Must Die published a report warning of Mayhem Shellshock attack, the experts explained to have detected a significant number of Linux and UNIX systems infected by several IP addresses belonging to […]
Yahoo! Contributors Network was affected by a serious Time based Blind SQL Injection vulnerability which allows the theft of sensitive data. The Yahoo! Contributors Network allows writers to submit articles, videos, it also allows contributors to receive assignments from Yahoo related various domains like Sports and Finance. The security researcher Behrouz Sadeghipour reported to that The Yahoo! Contributors Network (contributor.yahoo.com) is […]
The student Andrew Aude discovered a still unreleased feature for payments of Facebook Messenger by using the iOS and Mac OS X hacking tool Cycript. Facebook is preparing to enter the world of mobile payments according to a recent report published by Techcrunch. The student at Stanford, Andrew Aude discovered a still unreleased feature of Facebook Messenger by […]
Proofpoint firm uncovered a malicious campaign run by the Northern Gold criminal group which is targeting online banking users with a botnet of 500,000 PCs . Security experts at Proofpoint firm have identified a Russian-speaking cybercrime gang, dubbed Northern Gold, that has compromised more than 500,000 machines worldwide to steal users’ online credentials for major banks in the […]