-
Archives
- May 2018
- April 2018
- March 2018
- February 2018
- December 2017
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
-
Meta
Monthly Archives: August 2016
Ramnit Trojan Resurgence Now Complete as v2 Targets UK Banks
Ramnit’s revival is now complete as security researchers are starting to see more coordinated attacks spreading the banking trojan’s latest version, with the vast majority of targets being banks from the UK. Ramnit appeared in 2010, but in the beginning … Continue reading
Posted in Cyber Security, Malware
Leave a comment
Gozi Banking Trojan Campaigns Target Global Brands
Gozi, one of the oldest banking Trojans out there, is using highly elaborated webinjects along with behavioral biometrics for fraud protection bypass in new campaigns targeting global brands, buguroo researchers warn. Discovered in 2007, Gozi has had its source code … Continue reading
Hacker wins $5,000 for Chrome, Firefox address bar spoofing flaw
The “omnibox” vulnerability makes it easier to phish or steal user’s data. A vulnerability in how Chrome and Firefox render website addresses could allow an attacker to trick a user into visiting a spoof website that appears to be … Continue reading
1.4 Billion Android Devices Affected by Linux TCP Flaw
The security bug discovered in the Linux kernel’s implementation of the TCP protocol also affects a large portion of the Android ecosystem, mobile security vendor Lookout reports. According to researchers, CVE-2016-5696, the Linux TCP bug, affects around 80 percent of all … Continue reading
Posted in Cyber Security
Leave a comment
Shade Ransomware Adds RAT Features to Spy on High-Value Victims
Crooks use RAT to assess the financial status of infected victims and decide on how much money to ask for. The crooks behind the most recent versions of Shade have added an interesting new tidbit to their malware, installing a … Continue reading
Posted in Cyber Security, Malware, Pentest
Leave a comment
Australia Online Census Shutdown After Cyber Attacks
Australia was forced to reassure its citizens that their personal data was secure Wednesday, after malicious attacks by overseas hackers prompted an embarrassing shutdown of the online census. Australians are required to complete the census every five years or face … Continue reading
Posted in Cyber Security
Leave a comment
Researchers hack into software with malware threat
New York: A team of researchers has hacked the working of software with the potential risk of malware — disguised as lucrative advertisements — opening computers and other devices to hijacking. A team of researchers from Google and the New … Continue reading
Hackers detail the blood and guts of the 2016 Pwn2Own exploit expo
Kernel carnage bashes browsers and punishes plug-ins. Black Hat Zero Day Initiative researchers have detailed the winning hacks of this year’s Pwn2Own competition, painting a picture of broken browsers and owned systems. The quartet of Matt Molinyawe, Abdul-aziz Hariri, Jasiel Spelman, … Continue reading
Posted in Cyber Security, Vulnerabilidad
Leave a comment
US Uses Submarines as Portable Hacking Platforms
USA is exploring the future of cyber-warfare. This may come as a surprise to some, but the US has special submarines that it uses to hack into strategic targets, be they underwater communications cables or the infrastructure of other nations. This … Continue reading
Posted in Cyber Security
Leave a comment