Monthly Archive: October 2014

CYBER NEWS
shellshock-attacks-increase-fast

Shellshock Attacks Increase Fast

Companies cannot manage to patch up their processes in the wake of Bash vulnerability. Security experts have issued two warnings regarding new malicious attacks associated with Shellshock, as they observe a rapidly growing number of cybercriminals who take advantage of…

CYBER NEWS
Chrome-update

New Version of Chrome 39

In Six Weeks Time Google Are Releasing New Version of Their Browser to Prevent Relying on a Bug in the SSL 3.0 Certificate. As we wrote earlier this month Google discovered a flow in the SSL 3.0 certificate of web-sites…

CYBER NEWS
BlackEnergy

BlackEnergy Targeting Industrial Control Systems in the USA

Numerous industrial control systems (ICS) in the USA were compromised in a malicious campaign using a version of the BalckEnergy toolkit that was launched at least three years ago. The HMI products of Advantech/Broadwin WebAccess, GE Cimplicity and Siemens WinCC…

CYBER NEWS
Malware Downloader Tool Defoil Most Used in Scam Emails in September

Malware Downloader Tool Defoil Most Used in Scam Emails in September

Hackers use spam messages quite often as a malware distribution path. The malicious files are usually delivered to the user as attachments or links to a download location. Researchers report that most of the fraudulent emails sent is September, were…

CYBER NEWS
telethon-instagram-profile-hijacked

Telethon Instagram Profile Hijacked

The Instagram account of Telethon, a 2-day-charity-event in West Australia raising funds for children, was taken over by an unidentified person. The sum raised this year is $22.2million. Just after the end of the event, the official Instagram profile of…

THREAT REMOVAL
crowti-ransomware

71% of the Crowti Ransomware Infections Located in the US

Microsoft Research Team has detected a spike in a piece of system-locking ransomware similar to Cryptolocker, dubbed Crowti. Crowti has been around for a few months now, but researchers have noticed its activities in mid-October. In the peak of the…

CYBER NEWS
Google Android 5.0 Lollipop Version – Improved Security Features

Google Android 5.0 Lollipop Version – Improved Security Features

With the approaching release of Android 5.0 Lollipop version Goggle promises some extra security features, described in a blog from their Security Lead Engineer Adrian Ludwig posted on Tuesday. “From the moment you turn on a device running Android 5.0,…

CYBER NEWS
Cyber-Bullying Law to Be Presented in Parliament by the End of the Year in Australia

Cyberbullying Laws in Australia Don’t Cover Snapchat

The Abbott government in Australia is aiming to present new online children safety law to Parliament by the end of this year. In a speech from Tuesday this week Paul Fletcher, the Parliamentary Secretary for Communications, revealed some more details…

CYBER NEWS
New dyre banking trojan

New Dyre Banking Trojan Exploiting Adobe Reader Vulnerability

The US Computer Emergency Readiness Team (CERT) has issued a warning on Monday about a malicious email campaign delivering the Dyre banking Trojan, aka Dyreza. The malicious messages were detected in the middle of the month, and there is no…

CYBER NEWS
Android Devices Allow GPS and Google Maps Offline Usage

Android Devices Allow GPS and Google Maps Offline Usage

Many users were asking themselves whether they can download maps on their cellphones when they have internet connection and use them when they have no Internet access. The questions were raised as there is no cellphone coverage everywhere and often…

CYBER NEWS
Ebola-Themed-Scam-Delivers-Trojan

Ebola-Themed Scam Delivers Trojan

When it comes to the highlights of the day, cybercriminals get quite creative. Ebola-themed malware campaigns are gaining popularity these days. One of the most impressive ones is a tool that supposedly signals the users in case there is an…

CYBER NEWS
Linux-SUSE-Oct-2014

New Linux Enterprise 12 Version – Improvements by SUSE

Releasing the new Linux Enterprise 12 operating system on 27 October this year, the German dealers of the system, SUSE Linux Enterprise announced that it distinguishes from the Linux Red Hat / Ubuntu packages as more reliable, stable and secure,…

CYBER NEWS
Samsung-Knox-Vulnerabilities

Samsung Replies to Critical Report About Knox

Recently, a report criticizing Knox Technology’s password management and encryption functions in Samsung’s Note ad Galaxy mobile devices (Android-based) provoked a lot of replies and rebuttals. According to an advisory, that was published last week, a PIN selected during setup…

CYBER NEWS
New Geodo Malware

New Geodo Malware – Dridex – Known to Infect Microsoft Office Macros

During the last week, Palo Alto Networks security researchers have noticed that Dridex, the latest version of the Cridex Trojan, a data stealer also known as Feodo, Bugat and Geodo has been activated to attack bank security information through embedding…

CYBER NEWS
Dropbox-for-Business

Dropbox For Business With an Additional Security Certification

Dropbox announced the issue of ISO 27001 certificate, an addition to the serious list of compliances for Dropbox for Business. The new certificate includes 2013 revision of the standard certificate and has been updated and upgraded with the cloud services…

THREAT REMOVAL
New-Version-of-the-Koler-Ransomware

New Koler Ransomware Version Delivered Via SMS Message

The latest version of the Koler ransomware, known to target Android-operating devices, spreads through SMS messages. The malicious message contains shortened bit.ly URLs that direct to the infected .APK. Once the user has opened the corrupt file, the screen of…

CYBER NEWS
TOR-Exit-Server

Malicious Binaries Delivered by TOR Exit Server

Josh Pitts with Leviathan Security discovered an ”exit node” for the TOR network that is currently located in Russia and has been used to distribute a modified version of the legitimate code that the user has requested. In order to…

CYBER NEWS
Apple-pay

New Apple Pay Privacy Method – Is It worth It?

Apple Pay method is a new way for iPhone 6 and iPhone 6 Plus users to purchase goods and services without disclosing their debit or credit cards or any other bank information to merchants, thus remaining anonymous. All the users…

CYBER NEWS
SEDNIT

Pawn Storm Uses SEDNIT for Espionage Purposes

Created in 2007, Pawn Storm is the name of a cyber-espionage operation whose main aim is targeting military, governments and media entities. The name Pawn Storm comes from a chess action where the pawns are organized into a massive defense…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree