A redaction error in court-ordered release of the Lavabit case files confirmed that Edward Snowden was the target of the FBI. Lavabit was an encrypted webmail service founded in 2004 by Ladar Levison, it closed on August 8, 2013 after the US authorities ordered it to turn over its Secure Sockets Layer (SSL) private keys to order government surveillance activities. […]
Malware researchers at the Dr Web firm have found an Android malware named Gmobi specifically designed to spread as a software development kit (SDK). Malware researchers at security firm Dr.Web have detected a new strain of malware that was specifically designed to spread as a software development kit (SDK) used by software developers and mobile device […]
Hackers who allegedly infiltrated the Federal Reserve Bangladesh’s account were attempting to steal almost $1 billion, but typos thwarted the plan. This week the principal news agencies shared the news of the hack of the Bangladesh account at the Federal Reserve Bank of New York. The Bangladesh’s Finance Minister Abul Maal Abdul Muhith accused the U.S. Federal […]
TrendMicro published an interesting analysis of the principal cyber criminal underground communities in the Deep Web worldwide. A new interesting report published by the experts at TrendMicro highlights the differences between the principal underground ecosystems worldwide. Thinking of a unique “global” underground ecosystem is an error, every community has its own characteristics, the criminal crews that […]
Senior Pentagon officials on Monday revealed the military’s first use of cyber warfare operations against the ISIL terrorist group. The US military has started launching cyber attacks against members of the terrorist organization ISIS as part of the operation conducted to take back the Iraqi city of Mosul. The US military is using cyber tools to […]
The security researchers at FireEye Abdulellah Alsaheel and Raghav Pande have found a way to exploit Microsoft EMET (Enhanced Mitigation Experience Toolkit) to hack itself. The security researchers at FireEye security Abdulellah Alsaheel and Raghav Pande have found a way to exploit the Microsoft security tool Enhanced Mitigation Experience Toolkit to hack itself. The Enhanced Mitigation […]
A report issued by the DHS CERT confirms that the outage in Ukraine was caused by a well-coordinated attack still unclear the BlackEnergy role. In December, a major outage hit a region in Ukraine, more than 225,000 customers were affected by the interruption of the electricity. Security experts speculate the involvement of Russian nation-state actors that have used the BlackEnergy to […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs Project Cumulus – Tracking fake phished credentials leaked to Dark Web Linux Mint was hacked, website served malicious ISO on Saturday Utah systems experiences 300k hacking attacks a day due to the presence of the NSA Data […]
Mousejack attack – Researchers at Bastille firm demonstrated how to hack computers by exploiting a flaw in many wireless mouse and keyboard dongles. A bogus wireless computer mice and keyboards can be used by threat actors to compromise laptops from up to 100 metres away. The experts demonstrated that the attack, called mousejack attack, is […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs Stolen card data of 100,000 Britons for sale on the clear web Iranian hackers compromised former IDF chiefs computer Security Affairs newsletter Round 47 – News of the week Man charged of Laundering $19.6 Million earned with […]