Microsoft has uprooted Tor Browser from more than 2 Million Systems to eradicate Sefnit botnet. It has done it silently without user agreement. It was August 2013 when security experts noted a spike in Tor traffic network caused by cybercriminals activities, the malware specialists discovered a botnet based on Mevade malware, in mid-August the number […]
Proofpoint discovered more Than 750,000 Phishing and SPAM Emails Launched From “Thingbots” Including Televisions, Fridge Recently security researchers from Proofpoint uncovered a cyber attack against the Internet of Things (IoT), more than 100,000 Refrigerators, Smart TVs and other smart household appliances have been hacked to send out 750,000 malicious spam emails. The nightmare comes true, dozens […]
Kaspersky experts discovered a java version of icefog espionage campaign that targeted at least 3 us oil, gas companies spreading a backdoor dubbed Javafog. Kaspersky Lab in September 2013 announced to have discovered Icefog team, an emerging group of cyber-mercenaries available for hire to conduct surgical hit and run operations against strategic targets. The cyber […]
Internet of Things, a business growing at a compound annual rate of 7,9%, which are the principal cyber threats to the popular paradigm? Another week is starting and this morning the topic that I’ve found everywhere is Internet of Things (IoT), it is a growing paradigm that will influence our life in the next future, […]
Intego Malware Research Team discovered that OSX Flashback trojan is still active with sinkholing activity. Mac users must be aware. Flashback Trojan is a cyber threat known since 2011, it is a trojan horse that targeted a Java vulnerability on Mac OS X machines, early 2012 it spread to infect up to 600,000 machines as […]
Security experts at Arbor Networks have found a couple of servers used to arrange a malicious campaign against PoS with Dexter malware. At the end of 2012, Israel based company Seculert  notified about Dexter malware, used for parsing memory dumps of specific POS software related processes, looking for Track 1 / Track 2 credit card data. Dexter […]
A group of hackers has threatened Israeli banks to disclose stolen data belonging 3.7 million customers unless the organizations pay up. The Israel Hayom news revealed that at least three Israeli banks report extortion attempt by hacker demanding payoff in Bitcoin, the criminal threatens the financial institutions to reveal sensitive information of banking customers. The cyber […]
Kaspersky Lab experts have discovered a new Tor-based banking trojan named “ChewBacca”Â, it is the last malware exploiting Tor network. Tor network is a territory of exploration for cybercriminals that are increasing their attention in the popular anonymizing network for make more resilient malicious botnets. The principal advantages for adoption of hidden service in a […]
Incapula security firm published a new report on the analysis of website traffic evidencing the increment for malicious activities. Researchers at the Incapsula security firm have published a new study on the nature of website traffic, early 2013 the company revealed that 51% of the overall traffic was generated by non-human entities and 60% of […]
ENISA releases the ENISA Threat Landscape 2013, it a collection of information on top cyber-threats that have been assessed in the reporting period. The European Network and Information Security Agency (ENISA) published the ENISA Threat Landscape 2013 report, a document that was annually issued to analyze significant evolutions in the cyber-threat landscape. The ENISA has […]