How I Cracked a Keylogger and Ended Up in Someone’s Inbox
It all started from a spam campaign. Figure 1 shows a campaign we picked up recently from our spam traps with a suspicious document file attachment. Notice how poor theRead More →
Data Security News | Infosec Blog | Information Security Tutorials
It all started from a spam campaign. Figure 1 shows a campaign we picked up recently from our spam traps with a suspicious document file attachment. Notice how poor theRead More →
Threat actors are known to switch targeted geographies from time to time, and it appears that a number have set their sights on Canada within a short time-frame. In theRead More →
When it comes to accessing public websites, Tor has an intrinsic security problem: though the nodes between your computer and the public internet are unable to see where the trafficRead More →
mraptor is a simple tool designed to detect malicious VBA macros in MS Office files, based on characteristics of the VBA code. This article explains how it works, and howRead More →
On June 29th, Cheetah Mobile Security Research Lab issued warnings against a newly found mobile phone trojan family, which has been dubbed “Hummer.” During the first half of 2016, theRead More →
Lizard Squad’s tool becomes very popular thanks to the millions of unsecured IoT devices ready for the taking. Security experts from Arbor Networks have uncovered over 100 botnets that areRead More →
IN THE PAST two years a group of researchers in Israel has become highly adept at stealing data from air-gapped computers—those machines prized by hackers that, for security reasons, areRead More →
We recently noticed Retefe campaigns targeting UK banking customers. Using fake certificates, the Trojan is designed to trick victims into giving up their login credentials and other sensitive information. AtRead More →
In a seeming response to the recent Check Point investigative report, the Nuclear Exploit Kit shut down its entire infrastructure and ceased operation. Background The Nuclear Exploit Kit, one ofRead More →
Hacker will also have to pay £17,000 ($22,700) David Trail, 26, of Edinburgh, Scotland, will have to pay £17,000 ($22,700) as compensation and will serve 200 hours of unpaid work forRead More →
The cyber security expert Benjamin Tedesco during his vacation in Vienna, Austria, has spotted an ATM skimmer quite impossible to detect to common people. Have you ever seen a skimmerRead More →
FOR YEARS HOLLYWOOD has waged a war on piracy, using digital rights management technologies to fight bootleggers who illegally copy movies and distribute them. For just as long, hackers haveRead More →
On Tuesday, Facebook CEO Mark Zuckerberg posted a cutesy photo to Facebook celebrating Instagram’s now having half a billion users. It featured Zuck posing inside an IRL Instagram frame. ItRead More →
In one of the many ongoing legal cases surrounding a dark web child pornography site, a judge has written that the FBI did not require a warrant to hack aRead More →
Last year, we wrote about how Broadband could be banning porn in the near future, and last month the petrifying news emerged that watching porn on your phone could haveRead More →
InMobi ad network, which reaches more than 1 billion devices, settles FTC charges. A mobile advertising company that tracked the locations of hundreds of millions of consumers without consent hasRead More →
There’s something fishy about this botnet. Social media and advertising fraud investigations firm Sadbottrue has discovered a botnet of three million Twitter accounts, along with two smaller botnets of 100,000 botsRead More →
We came across a family of mobile malware called Godless (detected as ANDROIDOS_GODLESS.HRX) that has a set of rooting exploits in its pockets. By having multiple exploits to use, GodlessRead More →
On June 1st, I reported an arbitrary recursion bug in the Linux kernel that can be triggered by a local user on Ubuntu if the system was installed with homeRead More →
An unnamed hacker hacked the video conferencing software used by the Quebec Liberal Party and shared the news with the media. Politicians are a privileged target of hackers, in manyRead More →