More than 12 million devices are vulnerable to a simple attack that could compromise their home routers exploiting a vulnerability called Misfortune Cookie. More than  12 Million Home Routers are affected by a vulnerability called Misfortune Cookie that expose users to the risk of cyber attack. Researchers at Check Point Software Technologies reported the Misfortune Cookie flaw affects millions of devices running […]
Palo Alto Networks discovered that the software installed on many of Coolpad high-end Android phones includes a CoolReaper backdoor. The US security firm Palo Alto Networks have discovered that millions of Android smartphones commercialized by the Chinese smartphone maker Coolpad Group Ltd. may contain a “backdoor”, dubbed CoolReaper, that allows the tracking of the users. Palo Alto […]
Security experts at Trend Micro detected a new banking trojan dubbed TSPY_BANKER.YYSI which uses Pinterest as command and control system. According to researchers at Trend Micro once again, banks in South Korea are targeted by a new financial malware designed to target their customers. The attackers have targeted customers of the principal financial institutions of […]
Security experts at Sans Institute discovered a worm which exploits the popular Shellshock flaw to compromise QNAP systems in the wild. Experts at Sans Institute have discovered a new series of attacks in the wild exploiting the Shellshock attack code to compromise disk storage systems made by the Taiwan-based QNAP firm. The threat actors used […]
Yesterday Pierluigi Paganini presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. Yesterday I presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. The presentation highlights the security and privacy issues for the […]
Shockingly, for the last five years, hackers have been using a banking malware to siphon unencrypted credit/debit card information from the computer networks of Charge Anywhere, an electronic payment service used by millions of merchants worldwide. Charge Anywhere, an electronic payment service provider to merchant publicly admitted to a security breach that may have compromise […]
The ICS-CERT revealed that the BlackEnergy malware targeted SCADA HMI systems may be exploiting a recently patched flaw in the Siemens SIMATIC WinCC. Security experts at the Industrial Control System Cyber Emergency Response Team (ICS-CERT) Â reported that the BlackEnergy malware was used by threat actors in the wild to compromise HMI (human-machine interface) systems. The […]
Appleâs Mac OS X is no longer immune to malware and bugs says Kaspersky Security Lab.A survey of 2014 reveals that more malware attacks targeted Mac. For years, Mac OS X has been flaunted as the most immune OS to malwares and bugs. Well, the reign of Mac might end in 2014, with usersâ on […]
GOP released a new archive of Sony Pictures Entertainment confidential data including private information of employees, celebrity phone numbers, film scripts and many more. The Sony Pictures data breach is becoming a never ending history, the GOP is leaking company data and much more since the attack while security firms are providing the details of their […]
Security experts at Kaspersky Lab have detected a strain of Destover Malware that has been digitally signed with the certificates stolen during Sony attack. Security experts have detected a new strain of the Destover malware that was used in the recent Sony Pictures Entertainment breaches characterized by a singular feature, the sample is signed by […]