LinkedIn company filed a complaint in San Francisco against unknown hackers responsible for the creation of an impressive amount of fake profiles. LinkedIn is considered the social network of professionals, its scope is to give the possibility to the users to build their network of business relationship, sharing content of interest and exchanging opinion and […]
How cyber criminals could exploit typosquatting? The case of MtGox proposed by MalwareBytes, a fake domain used to serve malicious codes. Typosquatting, also called URL hijacking, is a common form of hacking which relies on mistakes such as typographical errors made by Internet users when typing the website address into the address bar of their browser. Should a user […]
Incapula security firm published a new report on the analysis of website traffic evidencing the increment for malicious activities. Researchers at the Incapsula security firm have published a new study on the nature of website traffic, early 2013 the company revealed that 51% of the overall traffic was generated by non-human entities and 60% of […]
LinkedIn iOS app parses HTML in the messages, and this can be used to phish for credentials or be escalated into a full blown attack. Senior CyberSecurity Specialist Zouheir Abdallah @ZuZ (Twitter handle), has publicly and responsibly disclosed a vulnerability in LinkedIn’s mobile app. Zouheir is known for reporting a serious vulnerability in DropBox’s 2 Factor […]
Two Million stolen Facebook, Twitter login credentials were found on ‘Pony Botnet’ Command and Control Server by Trustwave’s researchers. Two Million social media credentials stolen by cybercriminals have been found by security experts at Trustwave’s SpiderLabs, the collection includes popular social media like Facebook and Twitter and popular websites such as Google and Yahoo. Trustwave’s SpiderLabs […]
“Modern online-banking cybercrime” -The presentation analyzes current context for cybersecurity in Banking focusing on cyber threats and countermeasures. Today I presented at Cyber Threat Summit 2013 the topic “Modern online-banking cybercrime“, the presentation analyzes current context for cybersecurity in Banking focusing on cyber threats and countermeasures. The agenda is: Intro Phishing attacks Malware Based Attacks […]
Security Experts at Sophos have detected a new phishing campaign against the Italian brand Poste Italiane that makes use of an efficient social engineering technique. Sophos experts detected this week an intriguing case of phishing against the Italian postal service Poste Italiane, the scheme attracted the researcher’s attention due the reuse of an old social […]
IBM issued the X-Force 2013 Mid-Year Trend and Risk Report, a detailed analysis of current security landscape, including data on main cyber threats and information on mitigation techniques. IBM issued the X-Force 2013 Mid-Year Trend and Risk Report, a study that identifies Social media as the main target of cyber criminal activities. The powerful social networking […]
IT security firm F-Secure has published its Threat Report H1 2013, the document proposes a focus on Java exploits, mobile threats, Bitcoin mining, APTs and Mac malware. F-Secure security firm has released the Threat Report H1 2013 that provides an overview on cyber security landscape analyzing the events that characterized the first part of the year. The primary cause of incidents according the […]
It is very easy to hack the Nasdaq according the security expert Kolochenko that reported numerous vulnerabilities in the official website of the exchange. Just 10 minutes could be sufficient for an attacker to hack the Nasdaq Stock Market, this is the alert provided by Ilia Kolochenko, head of Swiss information security company High-Tech Bridge. The security expert […]