delete

Retefe Banking Trojan Targets UK Banking...

Hi guys, As previously reported by  Paloalto Research ‘Retefe banking Trojan’ has been around for some time, targeting Sweden, Switzerland and Japan. Recently Retefe had been targeting customers in UK banks. It uses fake certificates to trick customers into revealing their login credentials. At first, the victim receives a document with an embedded malicious JavaScript file per email. The document contains a very small image with a note asking the user to double click on it to view it better. After double clicking, the malicious embedded JavaScript is executed. The...
delete

Several Bugs Found in Uber App...

Hello everybody, The security firm called Integrity discovered 14 bugs in the Uber app recently. But they have only published details about six and are waiting on Uber to patch four more. One of the main issues they discovered had the potential to launch brute-force attacks against Uber’s promo code feature in the riders.uber.com panel for Uber drivers. By trying out countless random combinations, over 1,000 active promo codes have been found by researchers. In addition, $100 ERH (Emergency Ride Home) code that would have added $100 to each driver’s fair...
delete

How Facebook “Store Visits” Work...

Hi guys, Facebook is now allowing advertisers to know when you visit their stores—stores in the real world. This is made possible by tracking your Smart phone’s location with GPS and nearby Wi-Fi signals. Then combining this data with the ads you see, Facebook is able to tell how many people who see their ads subsequently visit their stores. Facebook mentioned when announcing the “store visits” service: “Historically, it has been difficult to quickly and effectively measure the impact of advertising on store visits and in-store sales. With the launch of store...
delete

Security Breach at Hard Rock Cafe...

Hello All, Hard Rock Cafe and Casino Las Vegas has alerted customers about a data breach. Their statement mentions that customer data may have been compromised if they visited the resort between October 27th, 2015 and March 21st, 2016. The resort started investigating the card payment methods they used, following several reports of unauthorized activity associated with payment cards. Hard Rock said in its statement: “On May 13, 2016, the investigation identified signs of unauthorized access to the resort’s payment card environment,” “Further investigation revealed...
delete

Cyber Criminals Targeting the 2016 Olymp...

Hi guys, Going to Watch the Olympics this year? Just as the cybercriminals leverage on popular sports events like the World Cup, they have started doing it with the Olympics. However the forthcoming Olympic Games have seen fewer attacks. This could be because the International Olympic Committee (IOC) keeps a very active Security Operations Center (SOC), working and treating the security incidents, reporting phishing and malware campaigns. As a result, the number of “in-the-wild” attacks targeting users at this time are low. But the malicious actors still have their...
delete

Hackers using your site to boost their S...

Hi everybody, Now hackers use your site to boost their SEO ranking even without your knowledge. Illicit websites selling everything from drugs and adult content to counterfeit goods are using illegally created referral links from legitimate websites. Amichai Shulman, co-founder and CTO of Imperva, explained that more than 700 host IP addresses which are used by a botnet to launch SQLi and HTML link injection have been identified.  In addition, comment spam attacks on vulnerable websites have been used to create hidden links back to their clients’ websites . This...
delete

Thanatos: Malware that Attacks Malware...

Hi everybody, Thanatos is a new strain of malware that can scan a target network for other malware and it gets its ability to target other malware through the use of intelligent plugins. It’s named after the Greek God of death for this reason. Reportedly the malware is available at the ‘crimeware underground’ systems and is offered at a price of $1,000 per month or $12,000 for a lifetime subscription. Thanatos indicates characteristics of a multi-staged malware commonly found in Advanced Persistent Threat (APT) technology; Where this malicious software...
delete

What’s Locky Ransomware ?...

Hello everybody, Locky Ransomware Spreads via Flash and Windows Kernel Exploits. A zero-day exploit (designated as CVE-2016-1019) was found in Adobe Flash Player recently. Magnitude Exploit Kit, used this flaw soon after and Adobe released an out-of-cycle patch. This flaw was exploited to lead drive-by download attacks with Locky ransomware as the payload. There’s more threats except the ransomware. On top of the Flash exploit, an old escalation of privileges exploit in Windows (CVE-2015-1701) was used to bypass sandbox technologies. This has been analysed...
delete

Public Servants in Singapore will Lose I...

Hi folks! Public servants in Singapore will be denied internet on work computers from May next year. The reason given is the risk of sending out work emails and shared documents. Officials have said that employees across government will be barred from forwarding any work-related information to personal emails. Online reactions and comments show that Singaporeans have responded with shock while some believed that this move contradicted Singapore’s much-promoted Smart Nation technology initiative. The restrictions will be rolled out over one year to all 100,000 public...
delete

Was SWIFT to blame for the Bangladesh Ce...

Hi folks, There were allegations that SWIFT  technicians made the nation’s central bank more vulnerable to hacking before an $81 million cyber heist in February. SWIFT rejected these allegations. the Brussels-based bank-owned cooperative said in a statement posted on its website: “SWIFT was not responsible for any of the issues cited by the officials, or party to the related decisions,” “As a SWIFT user like any other, Bangladesh Bank is responsible for the security of its own systems interfacing with the SWIFT network and their related environment...

« Previous Entries