Having pretended to be Gmail Account Services hackers send harmful emails to account owners.
According to the researches of the Chinese security software company, called Trend Micro, hackers have launched a campaign, which gives itself as Google‘s support service and is directed against users of Gmail service. Hackers work in such a way: the victim gets email allegedly from Gmail Account Services in which the owner of an account is informed on the unknown user authorization in his account with the help of unrecognizable device. The expert of the Trend Micro Company Jay Yaneza noted that the email can really be confused with the original notice of Gmail; however the knowing and attentive user will be able to find some differences.
Read moreAn elite team of US government hackers left Syria without internet, when they tried to hack one of the cores routers but instead crashed it, NSA whistleblower Edward Snowden said.
The three-day nationwide internet blackout in war-torn Syria in November 2012, which was blamed on either the government or the rebels, depending on who you listened to, was actually the doing of the Tailored Access Operations (TAO), a group of hackers in the employment of the US National Security Agency. And more more interesting.
Read moreThe Swiss Switch CH Company declared that the Trojan code, which attacks online banking systems of Switzerland‘s large banks was found.
Experts claim that the code is Russian; it is also capable to change settings in domain system of the computer or abduct SMS keys. In practice the Trojan aims the victim to appear on hacker‘s site and there all requisites for access to the real banking will be taken. The most important thing is the malicious code is capable to bypass even a two-factorial identification system; in addition it is capable to change DNS records in such a way that the client won’t notice anything.
Read moreThink you’re safe on the internet? Think again: Map reveals millions of cyber-attacks happening around the world in real time
A fascinating interactive map from security firm Norse serves as a stark reminder to just how dangerous the web can be. The live graphic plots every attack taking place on the internet, in real-time and reveals the number of attacks, where the attacks originate, and which locations they are aimed at. Norse’s interactive live map, allows viewers to watch as live attacks unfold around the world. The most popular target seems to be the U.S., with many attacks originating in China.
Read moreThe Bluebox Labs Company experts have published information about security vulnerability on Android platform which allows hackers to get access into functions of gadgets and to personal information without user‘s knowledge.
However many users are in danger as vulnerability was corrected only in the last Android version, but in other versions it still exists. After the Bluebox Labs Company found vulnerability, in English-speaking releases "hole" it was called "super vulnerability of new type", it is likely because of possibility to extend extremely malicious software. BlueBox experts called vulnerability Fake ID, because it allows malware apps to pass fake credentials to Android, which fails to properly verify the app's cryptographic signature.
Read moreAlmost a year ago, at the ‘Hack In The Box’ security summit in Amsterdam, a security researcher at N.Runs and a commercial airline pilot, Hugo Teso presented a demonstration that it's possible to take control of aircraft flight systems and communications using an Android smartphone and some specialized attack code.
Quite similar to the previous one, a security researcher claims to have devised a method that can give cyber criminals access to the satellite communications equipment on passenger jets through their WiFi and in-flight entertainment systems. Santamarta research paper titled “SATCOM Terminals: Hacking by Air, Sea and Land” explains that ships, aircraft and industrial facilities are all at risk of being compromised — perhaps with catastrophic results.
Read moreThe Tor encryption service is a high-profile bastion of computer security, but the project appears to have been compromised earlier this year.
Today, the Tor Project blog announced that an unknown party likely managed to gather information about people who were looking up hidden services — websites that users can operate and visit anonymously, like Silk Road — and could theoretically have compromised other parts of the network. Anyone who used Tor between early February and July 4th of 2014 "should assume they were affected" by the attack, says the Tor team. But they don't know what exactly that means.
Read moreThe main page Gizmodo was changed. Hackers have made all the users to be redirected to another web-page with the help of optional script.
The group of attackers compromised the well-known design Gizmodo`s reputation. Attackers tried to hack the site in order to spoil their reputation. Hackers changed the page of Brazilian web-portal Gizmodo by adding the script with the help of which guests of the site were redirected to an absolutely another page. The page on which the users were redirected was located in Sweden, under the domain name .se. The sheathing for server control was loaded on a site.
Read moreAccording to Security Affairs, vulnerabilities that reveal information about the user and execute code remotely were discovered in the operating system, called Tails.
The American information security company, called Exodus Intelligence has found some critical zero day vulnerabilities that allow attackers to disclose personal information. Note that the operating system Tails, which was based on Linux and provided anonymity through Tor, was recommended by Edward Snowden. Loc Nguyen, the information security expert from Exodus Intelligence said that the found problems allow both hackers and security services to gain access to personal user‘s data, in addition they help execute code remotely with the help of it attackers can have complete control over victim.
Read moreInformation security is the process of protecting the availability and privacy, but you should be aware that not all your applications are safe. Most of all anti-virus programs were forged by hackers. Experts from Trend Micro conducted research and made the conclusion that applications attack Android users more and more.
The company examined the most popular apps in Google Play and found that more than 77% of these applications are fake. Unlicensed programs are almost identical to the original, but at the same time they are very dangerous. According to the research of the Japanese company, called Trend Micro a huge number of fake software were found.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland