News Clipping


DDoS Attacks on the Rise Again: Akamai [infosecurity-magazine]

DDoS attacks rose again in Q2 for the first time in almost a year as the black hats returned to tried-and-tested tools and techniques including PBot, Mirai and Domain Generation Algorithms (DGA), according to Akamai. The cloud delivery provider crunched data collected from over 230,000 servers in more than 1600 networks to compile its State of the Internet/Security Report for Q2 2017.


CovertBand tracking system hijacks smart devices to record [dailymail]

Is that music tracking you? Hackers can remotely hijack smart devices and use SONAR to record your every move The CovertBand system can determine the position of objects using sonar It sends out a repeating pulse of sound waves in the 18 to 20 kHz range Devices were hacked to play music with pulses to track someone’s position It uses the device’s built-in microphones to...

Read More


Threat actor goes on a Chrome extension hijacking spree [proofpoint]

Chrome Extensions are a powerful means of adding functionality to the Chrome browser with features ranging from easier posting of content on social media to integrated developer tools. At the end of July and beginning of August, several Chrome Extensions were compromised after their author’s  Google Account credentials were stolen via a phishing scheme. This resulted in hijacking of traffic and exposing users to potentially...

Read More


New Vulnerability Discovered in LinkedIn Messenger [gbhackers]

World’s largest professional network  LinkedIn That has more than 500 Million Registered users and LinkedIn messenger Platform Vulnerability Allows attackers spread Malware into victims by taking advantage of LinkedIn’s security restrictions Flow. LinkedIn messenger is the Mostly used Future Platform which helps to professional to Share their skills, Messenger easily send resumes, transfer academic research and share job descriptions from the LinkedIn community.  Normally,LinkedIn security restrictions scan...

Read More


UK Government Issues Guidelines to Protect Smart Cars against Hackers [tripwire]

The Department for Transport and the Centre for Protection of National Infrastructure (CPNI) created the recommendations so that organizations can use them to build safer, more secure cars as smart technology continues to evolve. Known collectively as “the key principles of vehicle cyber security for connected and automated vehicles,” the guidelines consist of eight security best practices that organizations in the automotive sector are expected...

Read More


Tracking Recent Cybercrime Trends and Patterns [securityintelligence]

Throughout the years, banks have expanded their services by offering an ever-evolving set of online capabilities. As a result, financial institutions have become an obvious target for cybercrime and have been quick to deploy various layers of protection to keep their customers safe. Many cybercriminals operate like startup companies, consistently evolving methodologies and tools, and then measuring their return on investment (ROI). With banks adapting...

Read More


Chrome Extension With Over One Million Users Hijacked to Serve Adware [bleepingcomputer]

The developer of a very popular Google Chrome extension has regained access over his tool after an unknown hacker had managed to hijack his developer account and push a malicious version that contained adware. The extension’s name is Web Developer, a tool developed by Chris Pederick, Director of Engineering at Bleacher Report. The extension overlays a popup with various debug tools that developers can use...

Read More


Cerber Ransomware Evolves Again, Now Steals From Bitcoin Wallets [trendmicro]

Cerber ransomware has acquired the reputation of being one of the most rapidly evolving ransomware families to date. Just in May, we pointed out how it had gone through six separate versions with various differences in its routines. Several months later and it seems to have evolved again, this time adding cryptocurrency theft to its routines. This is on top of its normal ransomware routines,...

Read More


Page 52 of 62« First...102030...5051525354...60...Last »