• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • The role of Social Media in modern society - Social Media Day 22 interview
  • Experts shared PoC exploit code for RCE in Zoho ManageEngine ADAudit Plus tool
  • A ransomware attack forced publishing giant Macmillan to shuts down its systems
  • SessionManager Backdoor employed in attacks on Microsoft IIS servers worldwide
  • A long-running cryptomining campaign conducted by 8220 hackers now targets Linux servers
  • Pro-Russian hackers launched a massive DDoS attack against Norway
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Breaking News (Page 1100)

Breaking News

Indian Government bans third party email services, including Gmail and Yahoo

The Indian Government bans third party email services, including Gmail and Yahoo, from its offices in order to protect government communications. The Indian government will be monitoring the online activities of official computers, blocking any content...

March 1, 2015  By Pierluigi Paganini   Posted In  Breaking News  Intelligence  Laws and regulations 

Shadow Cloud Services a serious risk for Government Networks

Cloud Security Alliance revealed that shadow cloud service used by employees and unmanaged by IT can pose a major security problem for organizations. Last month, Cloud Security Alliance found out that shadow cloud service used by employees and unmanaged...

March 1, 2015  By Pierluigi Paganini   Posted In  Breaking News  Security 

TorrentLocker campaign uses email authentication to tune the operations

The emails of a new TorrentLocker campaign use Domain-based Message Authentication, Reporting and Conformance (DMARC) to avoid detection and collect data. Cyber criminals are continuously improving the technique to spread malicious code and avoid detection...

March 1, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Malware 

Twitter is tracking phone numbers to prevent trolls and abuses

Twitter announced that it is starting to track phone numbers of users as a measure to prevent abuses like the creation of new bogus accounts. A few weeks ago, Twitter CEO Dick Costolo explained the difficulties the company is facing to prevent the abuse...

February 28, 2015  By Pierluigi Paganini   Posted In  Breaking News  Security  Social Networks 

The transportation giant Uber discloses a Data Breach

The giant Uber announced a data breach that resulted in unauthorized access to the driver partner license numbers of roughly 50,000 of its drivers. Are you a user of the Uber service? There is a bad news for you! Uber also enters the long list of companies...

February 28, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Mobile  Security 

FireEye Assessment of 7 Million iOS and Android Apps shows a disconcerting scenario

FireEye released a report containing the results of a comprehensive Mobile Threat Assessment of 7 Million iOS and Android Apps. According to U.S. firm FireEye, more than five billion downloaded Android apps are vulnerable to cyber attacks due to the presence...

February 28, 2015  By Pierluigi Paganini   Posted In  Breaking News  Mobile 

Cyber criminals target trading algorithms to steal related code

Security firms discovered a significant increase in the number of targeted attacks aimed at stealing the code related trading algorithms. Cyber criminal organizations appear more interested in target trading algorithms, patents, trade secrets than other...

February 27, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime 

Pharming attacks exploit default passwords to hack routers

Experts at Proofpoint uncovered a pharming attack that uses phishing to exploit router vulnerabilities and carry out malicious activities. Security firm Proofpoint revealed that its experts recently detected a spam campaign targeting organizations...

February 27, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking 

Tor Browser 4_0_4 Release improves security and privacy

The Tor Project has announced a new version of Tor Browser Bundle, Tor version 4.0.4, that improves privacy and security features. The Tor Project has announced a new release of the Tor Browser Bundle, Tor Browser version 4.0.4, that improves privacy...

February 27, 2015  By Pierluigi Paganini   Posted In  Breaking News  Security 

Joomla Reflection DDoS attacks exploit a Google Maps Plugin flaws

Akamai firm discovered numerous attacks exploiting a known vulnerability in a Google Maps plugin to run Joomla Reflection DDoS attacks against enterprises. Experts from Akamai Technologies' Prolexic Security Engineering and Response Team (PLXsert) have...

February 27, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking 


« First‹ Previous10961097109810991100110111021103Next ›
Page 1100 of 1103



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT