Monthly Archives: March 2016

WHAT ARE WEB APPLICATION SECURITY RISKS & ATTACKS?

The websites and web applications are mission-critical business systems that must operate without security problems to process corporate confidential information. And to respect data protection rules, companies must consider web application security testing services. There are statistical evidences supported by … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged , , | Leave a comment

HOW TO IMPLEMENT NETWORK SECURITY IN ENTERPRISE NETWORK?

The objective of network security assessment services is to keep data assets secure and protect the enterprise IT infrastructure. Typically, businesses are threatened by technology risks and vulnerabilities for being connected to internet or for handling confidential client information. There … Continue reading

Posted in Cyber Security, Software Testing company in Mexico | Tagged , , | Leave a comment

Vaccine for CTB-Locker, Locky and TeslaCrypt Ransomware Released

It’s better to prevent than to pay the ransom. Romanian security vendor Bitdefender has updated its vaunted anti-ransomware vaccine to add support for the latest versions of the CTB-Locker, Locky and TeslaCrypt ransomware families currently ravaging users all over the globe. The … Continue reading

Posted in Malware | Tagged | Leave a comment

Crypto Ransomware Found On EC-Council Website That Runs A Certified Hacker Program

Short Bytes: A ransomware was found on the official website of EC-Council that runs Certified Ethical hacker program. After EC-Council did not reply to Fox-IT in the context of the malware injected in their site, Fox-IT decided to go public … Continue reading

Posted in Cyber Security, Malware | Tagged | Leave a comment

Malware is being signed with multiple digital certificates to evade detection

Malware authors are signing threats with multiple digital certificates to account for a shift from SHA1 to SHA2. Symantec has recently observed various malware families seen in the wild signed with multiple digital certificates. As seen with Suckfly, valid, legitimate certificates … Continue reading

Posted in Cyber Security, Malware | Tagged | Leave a comment

Can malware detect that it’s running in your sandbox?

If you think an application is suspicious, then you might run it in a sandbox, a virtual machine, maybe use a debugger, and watch what it does. And if nothing happens then that means it’s safe. Right? Well, maybe not. … Continue reading

Posted in Cyber Security, Malware | Tagged | Leave a comment

Apple Macs, iPhones, iPads, Watches, TVs can be hijacked by evil Wi-Fi, PDFs – update now

iOS, OS X, watchOS, tvOS all patched. Updated Apple has today emitted security updates for pretty much everything it makes, and you should install them as soon as you can because it’s all bad news. iPhones, iPads and iPods should grab … Continue reading

Posted in Vulnerabilidad | Tagged , | Leave a comment

Indian Hackers Rule Facebook’s Bug Bounty Program By Making Rs 48 Million

Short Bytes: The Indian security researchers have topped the list of hackers getting the highest awards and participation in Facebook Bug Bounty program. This program allows the researchers to locate loopholes in Facebook’s products and report them via a suitable … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged | Leave a comment

Adware Infects Firmware of 40 Low-End Android Smartphones

Adware also affected some well-known Android apps. An Android trojan specialized in showing unwanted ads has managed to infect the firmware of 40 low-end Android smartphones, and even a few popular applications, some of them created by cyber-security vendors. The trojan, … Continue reading

Posted in Malware | Tagged | Leave a comment

Buhtrap group stole tens of millions of dollars from Russian banks

From August 2015 to February 2016 Buhtrap group managed to conduct 13 successful attacks against Russian banks for a total amount of $25.7 mln. Since August of 2015, the Buhtrap group has conducted 13 successful attacks against financial institutions stealing … Continue reading

Posted in Cyber Security | Tagged , | Leave a comment