Source: National Cyber Security – Produced By Gregory Evans Following the news that hackers taken control of virtual cash worth $60m (£41m) by exploiting a bug in the DAO, a system designed to help start-ups, Chris Campbell, Solution Architect at Veracode commented below. “Crypto currencies and the markets that they…
Hacker arrested by Canadan Police for exploiting HeartBleed Bug
Source: National Cyber Security – Produced By Gregory Evans A 19-year-old man is arrested and charged by Canadian police a who allegedly exploited the Heartbleed bug to steal personal data from the Canadian Revenue Agency’s website. Stephen Arthuro Solis-Reyes, who allegedly grabbed 900 social insurance numbers (SINs) over a period…
How to beat hackers exploiting the latest IE zero-day bug
Organizations have a few alternatives for shielding against an as of late ran across zero-day defenselessness in Internet Explorer and masters say organizations ought to begin quickly. Throughout the weekend, security merchant Fireeye discovered an adventure pointed at guard and monetary administrations organizations utilizing Ie9 through Ie11. The endeavor was…
Hackers Target Al Arabiya, Leak Passwords After Exploiting Zimbra Vulnerability.
Hackers associated with notorious LullzCrew are back in public stunts. Yesterday they targeted Al Arabia, Saudi owned Tv Channel, and leaked its sensitive data. Lullz Crew says it’s back again and now it has teamed up with Horsemen of Lullz, another hacktivist group, to launch a massive operation against…
Chinese Hackers exploiting Internet Explorer Zero Day vulnerability for Cyber Espionage
Web site for the Council on Foreign Relations was compromised and recently hit by a drive-by attack that was detected earlier this week. Hacker are suspected to be from China , who are exploiting a zero day Internet Explorer vulnerability for Cyber Espionage attack against one of American most elite foreign policy…
GFI Labs Observes Cybercriminals Exploiting High-Profile Brands to Capture Victims’ Attention
CLEARWATER, Fla., April 3, 2012 /PRNewswire/ – GFI Software today released its VIPRE® Report for March 2012, a collection of the 10 most prevalent threat detections encountered last month. GFI Labs also documented several spam attacks and malware-laden email campaigns infiltrating users’ systems under the guise of communications from well-known companies…
Scammers waste no time in exploiting Steve Jobs’s death
Bottom-feeding cyber scum lure Facebook users to malicious websites with promises of free iPads Follow @tsamson_IW As much of the world mourns the passing of Steve Jobs — one of the technology industry’s greatest visionaries — the bottom feeders of the cyber crime world are greedily exploiting the tragedy through…
Scammers waste no time in exploiting Steve Jobs’s death
Bottom-feeding cyber scum lure Facebook users to malicious websites with promises of free iPads Follow @tsamson_IW As much of the world mourns the passing of Steve Jobs — one of the technology industry’s greatest visionaries — the bottom feeders of the cyber crime world are greedily exploiting the tragedy through…
Scammers waste no time in exploiting Steve Jobs’s death
Bottom-feeding cyber scum lure Facebook users to malicious websites with promises of free iPads Follow @tsamson_IW As much of the world mourns the passing of Steve Jobs — one of the technology industry’s greatest visionaries — the bottom feeders of the cyber crime world are greedily exploiting the tragedy through…