U.S.-China Economic and Security Review Commission reported for the first time that cloud computing “represents a potential espionage threat.” U.S.-China Economic and Security Review Commission reported for the first time that cloud computing “represents a potential espionage threat.” , Chinese hackers are a persistent collector of sensitive information, their action is incessant and represent a […]
A study conducted by company’s enterprise security arm HP Fortify revealed that the majority of mobile apps based on iOS is vulnerable. The company’s enterprise security arm HP Fortify conducted a series of tests on mobile apps that produced concerning results, almost every app is vulnerable. Mike Armistead, vice president and general manager, Enterprise Security […]
A new report based on documents leaked by Snowden revealed that the NSA placed malicious software on more than 50000 networks around the world. The NSA infected more than 50000 networks worldwide with malicious software designed to steal sensitive information. The large-scale cyber espionage operation was revealed once again by documents provided by former NSA […]
Researcher Irene Abezgauz from the Quotium Seeker Research Center discovered a Facebook flaw that allows anyone to see a profile’s private friend list. Facebook is the privileged target for hackers and cybercriminals, the popular social network is a mine of data that could be used to acquire information on a specific target or to conduct […]
Security researcher Oren Hafif demonstrated how to hack a Google Gmail account exploiting a serious flaw in the password reset process. A serious vulnerability in the password reset process of Google account allows an attacker to hijack any account, this is the sensational discovery made by security researchers Oren Hafif. “that password recovery is often in […]
Trusteer researchers have uncovered a sneaky piece of financial malware, known as i2Ninja, being sold on a Russian cyber crime forum. A new financial malware dubbed i2Ninja menaces banking, despite it has yet to be discovered in the wild, researchers at the IBM company Trusteer have found a sneaky piece of the malicious code on […]
Imperva experts detected a surge in the exploitation of Jboss Application Server as result of the public disclosure of an exploit code. The cybercrime no stops and this time the alarm is related to a vulnerability in JBoss Application Servers that enable an attacker to remotely get a shell on a vulnerable web server. The concerning […]
Users of Netflix, the provider of on-demand Internet streaming media, must beware of Silverlight exploit that could allow attackers to hack their systems. A vulnerability in Microsoft Silverlight 5 exposes to the risk of cyber attacks nearly 40 million Netflix streamers, the flaw is being exploited to execute arbitrary code on victim’s systems without any […]
Cryptolocker is considered one of most insidious threat for Internet users, a recent spam campaign targeted 10M UK Users, let’s learn how fight it Recently the UK’s National Crime Agency has issued an alert on a large spam campaign based on CryptoLocker ransomware that is targeting more than 10 million UK based email users. CryptoLocker […]
Jeremy Hammond was sentenced to 10 years in federal prison, during the process he declared that FBI directed my attacks of Anonymous on foreign governments. Jeremy Hammond, the popular Anonymous hacktivist considered the principal responsible for the disclosure of thousands of emails from the private intelligence firm Stratfor was sentenced on Friday to 10 years in […]