Security experts at MalwareBytes discovered that unaware WordPress users are infected with a banking trojan served by a fake Pirate Bay website. Some WordPress websites are being used to redirect users to a fake Pirate Bay that is being used to make the reader to push malware, says Malwarebytes. WordPress websites were injected with the same iframe during the […]
Security experts revealed that more than 100,000 home routers belonging to Australian households are still vulnerable to the PODDLE vulnerability. Once again, home routers are exposed to the risk of cyber attacks. This time the news is related to the Australian consumer broadband modems that resulted affected by the Poodle and Freak vulnerabilities. Many Australian households […]
President of ECIPS warns of cyber terror problems ahead at C I P R congress.  Terrorism is evolving with cyber warfare capability. Critical Infrastructure Protection & Resilience meetings were attended by almost every agency in EU and US defense department. The Critical Border Cyber Defense Infrastructure of the EU Critical Infrastructure Protection & Resilience […]
Anonymous has posted a video message threatening Israel with âthe electronic holocaustâ which would âerase it from cyberspaceâ on next April 7. Once again the group of  hacktivits Anonymous has threatened Israel with âthe electronic holocaustâ which would âerase it from cyberspace.â The massive cyber attack announced by Anonymous is planned on April 7 for âcrimes in the Palestinian territories.â […]
Modern maritime ships are considered a privileged target for hackers and pirates that are increasing their pressure on the Maritime Shipping Industry. Hackers target Cyber Attack on Ships: Maritime Shipping Industry at Risk Modern maritime ships are often monitored and controlled remotely from shore-based facilities thousands of miles away to ensure efficiency. This creates a […]
Security experts at Symantec security firm have uncovered a persistent diet spam operation on Twitter that presents interesting aspects. In July 2014, experts at Symantec have uncovered a spam campaign offering the Green Coffee Bean Extract, a diet supplement, a few months later the experts discovered that the same operators behind campaign is continuing its activities […]
Thomas JiĹikovskĂ˝ suspected of owning the black marketplace Sheep Marketplace, an alternative for Silk Road, was arrested while trying to buy a luxury house. The Operation Onymous and the seizure of the popular Silkroad black market have deeply influenced the underground ecosystem. The closure of Silkroad advantaged other black markets like Evolution and Sheep Marketplace. The Evolution […]
A new study conducted by researchers at the Carnegie Mellon University revealed that dozens of mobile apps collect extensive location data. A new study conducted by researchers at the Carnegie Mellon University revealed that a number of Android mobile apps collects geolocation data related to the users. According to the Wall Street Journal, the researchers […]
The exploitation of the Dell System Detect tool would allow threat actors to remotely install malware on users’ your Dell computers. This specific subject was already talked in mid-November 2014 when it was discovered and reported to Dell which patched it in January 2015, but it’s uncertain if the fix closed all the “holes”. The […]
The presence of a vulnerability in the ANTLabs InnGate devices used in hotels and conference centers exposes users to risk of remote exploit. Recently the security firm Cylance has discovered a vulnerability (CVE-2015-0932) affecting the ANTLabs InnGate devices that are popular Internet gateway for visitor-based networks like the one we find in hotels and convention centers. The exploitation […]