De-Anonymize Google Users with new Timing Attack is possible, it is also possible identify Tor users if theyâre logged in to Google while using Tor browser. De-anonymize Google users is the goal of different studies and a new research conducted by Andew Cantino, the vice president of engineering at Mavenlink, demonstrates that it is possible to […]
Experts at Kaspersky spotted an interesting attack from Brazilian criminals that try to change the DNS settings of home routers by using a web-based attack. Experts at Kaspersky Lab have uncovered a hacking campaign conducted by Brazilian threat actors which is targeting home routers by using a web-based attack. The hackers are adopting different techniques, […]
The APWG Report Q2 2014 states that phishing activities continue to increase, phishers are targeting Crypto Currency, Payment Services and Retail Sites. The APWG has published its new report related to phishing activities in the period April – June 2014, the document titled “Phishing Activity Trends Report, 2nd Quarter 2014” states that online payment services […]
A study conducted by Blue Coat on 660 million unique hostnames reports that 470 Million websites are One Day Wonders and 22 Percent are malicious. A recent research conducted by security experts at Blue Coat revealed that 470 million websites exist only for one day and nearly one on five is malicious. Blue Coat experts over a […]
Russian Hackers are spreading the Kelihos Trojan leading victims into believing that it is a software to hit Western Governments. Kelihos botnet is still active and exploited by the cybercrime ecosystem to monetize its effort as discovered by security experts at Bitdefender. Cyber criminals have a single purpose, to earn money by any means, for this reason it is […]
Nuclear Regulatory Commission systems were hacked three times in the last three years. According to investigators the bad actors are foreign hackers. U.S. Nuclear Regulatory Commission (NRC) has been hit by cyber attacks three times during the past three years, bad actors behind the offensives have conducted spear phishing attacks to compromise the internal network […]
Security Experts at Cheetah Mobile have uncovered a new scam based on a fake Facebook Color Changer App which infected 10000 users worldwide. Facebook  is a privileged target for cyber criminals, in many cases old fraud schema are proposed again by bad actors, it is the case of the bogus Facebook “Color Changer” app. Researchers at China-based Internet company […]
A very sophisticated phishing campaign has been discovered by Malcovery Security, it targets French-speaking computer users to steal banking credentials. Phishing is a very prolific business for cybercrime, bad actors are adopting even more sophisticated techniques like the one discovered recently which hit French-speaking computer users, in an attempt to steal their online banking credentials. The […]
Experts at Palo Alto Networks uncovered a new Nigeria 419 scam scheme which is targeting businesses in a malicous campaign dubbed Silver Spaniel. The Nigeria 419 schema adopted by criminal gangs world wide has been improved by scammers which are also including the use of remote access trojans (RATs). A report published by the Palo […]
Trend Micro has discovered a malicious campaign named Operation Emmental, which is targeting online banking systems of financial institutions worldwide. Trend Micro has published a report on a hacking campaign dubbed “Operation Emmental” which targeted Swiss bank accounts whit a multi-faceted attack that is able to bypass two factor authentication implemented by the organization to secure its customers. The […]