Experts from Cheetah Mobile firm revealed that the Hummer Android malware has already infected millions of smartphones worldwide. Security experts from the Cheetah Mobile firm are monitoring an Android malware dubbed Hummer since August 2014. The researchers noticed a significant increase in the number of infections in 2016, with a daily average of 1.4 million […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all let inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html The value of the Ethereum Digital Currency is Plummeting after a hack Be careful, a new phishing tactic […]
According to the experts from FireEye attacks from China against the US started declining in mid-2014 and has continued to decrease, why? Earlier this week, FireEye released a report showing a significant decline in cyber-attacks originating from China. According to the report, the attacks started declining in mid-2014 and has continued. According to FireEye, the […]
Like the FBI Director Comey also Zuckerberg use tapes to cover the webcam of his laptop, evidently he fear that someone could spy on him. A Facebook post published by Mark Zuckerberg to celebrate more than 500 million people now use Instagram is attracting the attention of IT experts. In the image that is included in the […]
The exploit kit landscape is rapidly changing,the Angler and Nuclear EK disappeared and overall malicious traffic drops by 96% since April. As highlighted by security experts the threat landscape is in continuous evolution, despite the criminal underground was monopolized by Angler and Nuclear exploit kits for several years other EKs represent a serious threat to online […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all let inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html How to bypass two-factor authentication with a text message WauchulaGhost targets ISIS Twitter Accounts and floods them with […]
According to the US GAO the FBI’s Next Generation Identification facial recognition system has access to 411.9M photos of Americans and foreigners alike. When we talk about technology, privacy and security are concepts that are often at odds. Let’s think for example of a facial recognition system, this technology could be used in many contexts […]
Security researchers have found a vulnerability that could allow attackers to send massive messages on Telegram bypassing its limitations. Security researchers have devised a method to send massive messages on Telegram. The experts have found a flaw that allows them so send messages of any size as showed in the proof-of-concept provided by the researchers. […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all let inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html THANK YOU! Old CVE-2014-3704 flaw in Drupal still exploited in attacks Sh0ping.su hacked, stolen card data and accounts […]
Experts from Cisco Talos team have improved their decryptor tool to allow the recovery of files encrypted by all the Teslacrypt Ransomware variants In May, criminals behind the TeslaCrypt ransomware leaked online the master encryption key that allowed security experts to develop a decryption tool for the last variant of the threat. “In surprising end to TeslaCrypt, […]