_Cyber Security News

Find the latest important cyber security news here.

Aspida Shortlisted in Seatrade Awards

Established in 1989, the Seatrade Awards recognise, reward and honour the achievements of the maritime industry. This year has been the most competitive year ever for the Seatrade Awards, attracting the highest number of entries on record. Aspida Group has … Read More

Featured Post

IMO imposes Cyber Security on Ship ISM

IMO has given shipowners and managers until 2021 to incorporate cyber risk management into ship safety, giving the industry another issue to deal with. Owners risk having ships detained if they have not included cyber security in the ISM Code safety … Read More

Featured Post

SambaCry – A Cyberweapon Lurking

With thousands of users and companies hit by WannaCry last month, a new threat is now lurking the cyberspace While some Users and Administrators suffered from Wannacry, they learned a valuable lesson. Always be on the latest update. But there … Read More

Featured Post

A cyberweapon unleashed

Last Friday the world witnessed one of the greatest cyber attacks ever recorded. Europol said that the attack was of an “unprecedented level and requires international investigation.” Attack started on Friday and it involved a zero-day hack leaked from the … Read More

Featured Post

ASPIDA Cyber Security Welcomes you at OCYANIC 2017

OCYANIC is a one-day event, addressing technology and security decision-makers of the Maritime industry. The conference will inform and alert about the latest threats and defences available. 28 March 2017 at 09.30 a.m. at the Athens War Museum Who should … Read More

Featured Post

ASPIDA Cyber Security Welcomes you at Infocom Security 2017

We’ll be happy to meet you on 29 – 30 March 2017  in Athens, Divani Caravel ASPIDA Cyber Security CEO Panos G. Moraitis will speak on the subject of: Assessing GDPR Implications. Challenges and Opportunities, On 30th March during the 1st Section Visit … Read More

Featured Post

Cloudbleed: Serious Bug Exposes Sensitive Data From Millions Sites Sitting Behind CloudFlare

A severe security vulnerability has been discovered in the CloudFlare content delivery network that has caused big-name websites to expose private session keys and other sensitive data. CloudFlare, a content delivery network (CDN) and web security provider that helps optimize … Read More

Featured Post

10 Essential Elements For Your Incident-Response Plan

The middle of a DDoS attack or ransomware infection is hardly the time to start talking about divisions of labor, or who should do what when.  Image Source: Wikimedia Commons, courtesy of PH1 Terry Cosgrove Failing to plan, as we know … Read More

Featured Post

What’s the actual cost to a business of a data breach?

Cisco has released the 10th of its annual cybersecurity reports, leading some publications to scream that security breaches can cost businesses 20% of their annual turnover. If you burrow into the headlines, however, it becomes apparent that only a third of … Read More

Featured Post

Watch Out! First-Ever Word Macro Malware for Apple Mac OS Discovered in the Wild

After targeting Windows-based computers over the past few years, hackers are now shifting their interest to Macs as well. The emergence of the first macro-based Word document attack against Apple’s macOS platform is the latest example to prove this. The concept of … Read More

Featured Post

Cybersecurity: Queen to open centre to protect against attacks

A new centre to protect the UK against cyber-attacks is to be officially opened by the Queen later. The National Cyber Security Centre (NCSC) in London is designed to improve Britain’s resilience to attacks and act as an operational nerve … Read More

Featured Post

Hacker breaches police forum to sell over 700,000 NSA, FBI and DHS staff account data on dark web

The data reportedly stolen from PoliceOne.com, which is used only by verified law enforcement officials, is dated 2015. A pseudonymous hacker going by the name Berkut is reportedly selling a hacked database of over 700,000 user accounts from a popular police forum … Read More

Featured Post

Hackers Can Intercept Data From Popular iOS Apps

Dozens of popular iOS applications are affected by vulnerabilities that allow man-in-the-middle (MitM) attackers to silently intercept data from connections that should be protected by TLS, a study has found. The developers of verify.ly, a service designed for finding security issues … Read More

Featured Post

Cyber Security – General Awareness Training

DNV GL acknowledges that the maritime sector is in need of adequate cyber security to safeguard organizations, assets and information. To that end, Maritime Academy Hellas is offering on 11 May 2017, a 1-day general awareness Cyber Security course in … Read More

Featured Post

Check If Your Netgear Router is also Vulnerable to this Password Bypass Flaw

Again bad news for consumers with Netgear routers: Netgear routers hit by another serious security vulnerability, but this time more than two dozens router models are affected. Security researchers from Trustwave are warning of a new authentication vulnerability in at … Read More

Featured Post

Hackers target InterContinental payment card data of 12 US hotels in massive data breach

The hotels’ servers that processed payment card data were infected with a malware. The InterContinental Hotels Group (IHG) has confirmed that 12 of its US-based hotels were hit with a data breach that saw hackers target payment card data. The confirmation … Read More

Featured Post

Many WordPress Sites Hacked via Recently Patched Flaw

The critical vulnerability disclosed last week by WordPress developers has already been exploited to hack thousands of websites, security firm Sucuri warned on Monday. When WordPress 4.7.2 was released on January 26, the developers of the content management system (CMS) informed users … Read More

Featured Post

PayPal phishing scam: How to avoid becoming a victim of the fraud

Hackers have been sending fake emails making users believe that their PayPal account has been limited. PayPal, one of the most used online payment systems in the world is facing a widespread phishing scam targeting its users to steal their … Read More

Featured Post

David Beckham’s emails used in blackmail bid by alleged Eastern European hacker

Portugal-based Doyen Sports indicated that the hacker had also breached other sports agencies. David Beckham’s hacked emails were reportedly used by an alleged Eastern European hacker to blackmail the football icon. The sister company of a public relations firm that represents … Read More

Featured Post

Digital transformation forces businesses to rethink cybersecurity

Seeking to maintain competitive advantage, gain market share and satisfy evolving customer demands, businesses around the globe are pursuing digital transformation. And that digital transformation is forcing reevaluation of cybersecurity strategies, according to a new study by BMC and Forbes Insights. One … Read More

Featured Post

Facebook, Google, others launch drive against fake news in France

Social media companies Facebook, Google and a group of news organizations launched an initiative on Monday to tackle fake news stories in France, with the media in the spotlight as the country’s presidential election approaches. Facebook said it would work … Read More

Featured Post

Windows SMB Zero-Day Exploit Released in the Wild after Microsoft delayed the Patch

Last weekend a security researcher publically disclosed a zero-day vulnerability in Windows 10, Windows 8.1 and Server editions after Microsoft failed to patch it in the past three months. The zero-day memory corruption flaw resides in the implementation of the … Read More

Featured Post

Russian hacking aims to destabilise West, Sir Michael Fallon says

Russia is carrying out a sustained campaign of cyber attacks targeting democracy and critical infrastructure in the West, UK Defence Secretary Sir Michael Fallon has warned. Moscow was “weaponising misinformation” in a bid to expand its influence and destabilise Western … Read More

Featured Post

Pay for experts to rise as cybercrime ‘to cost $6tn a year by 2021’

IT security is one of those odd industries: everybody wishes it were not necessary,  but accepts it has to be there. This is why, if you’re a specialist in it, your skills are going to become increasingly prized in 2017. … Read More

Featured Post

7 Common Reasons Companies Get Hacked

Many breaches stem from the same root causes. What are the most common security problems leaving companies vulnerable? Failure to check code before it’s deployed Certain risks will stay strong unless businesses change their behavior, says Kelley. Injections, which she … Read More

Featured Post

Russia accuses cybersecurity experts of treasonous links to CIA

Rumours swirl of connection to revelations about US election hacking, as state media says Sergei Mikhailov and Dmitry Dokuchayev ‘betrayed their oath’ Two of Moscow’s top cybersecurity officials are facing treason charges for cooperating with the CIA, according to a Russian … Read More

Featured Post

5 things you can do to keep your data from being hacked

These simple steps can help ensure that your private data is kept safe from hackers. The internet has become an increasingly hostile environment over the past few years. 2016 saw massive data breaches affecting millions across the globe, raising concerns … Read More

Featured Post

Lloyds a victim of cyber attack that hit banking services

Lloyds Banking Group is working with law enforcement agencies to trace who may be behind a cyber attack that caused intermittent outages for customers of its personal banking websites almost two weeks ago, according to a source familiar with the incident. … Read More

Featured Post

Ransomware Hijacks Hotel Smart Keys to Lock Guests Out of their Rooms

What’s the worst that could happen when a Ransomware hits a Hotel? Recently, hundreds of guests of a luxurious hotel in Austria were locked in or out of their rooms when ransomware hit the hotel’s IT system, and the hotel … Read More

Featured Post

Watch Out For This iPhone-Crashing Text Message

It looks like a white flag emoji, a zero, and a rainbow emoji A single text message could cause your iPhone to temporarily freeze and restart, according to several reports. The troublesome text won’t affect devices running Apple’s latest software, … Read More

Featured Post

Hackers Can Listen to your Facebook Messenger Voice Messages With This Simple Hack

This Simple Hacks Allows Hackers To Listen to Your Facebook Messenger Voice Messages Both FB Messenger and Facebook-owned WhatsApp allow users to send voice messages using the Mic icon in the chat bar. While many don’t use the Facebook Messenger voice … Read More

Featured Post

The New iOS Update Fixes Big Security Holes, So Get It Now

APPLE UPDATES IOS with enough regularity that it begins to feel routine. And most time, it is, especially the farther you get from the company’s yearly, feature-packed version overhauls. iOS 10.2.1, released today, is not routine. In fact, it’s very important … Read More

Featured Post

Hacker Who Stole Celebrities’ Nude Photos Gets 9 Months In Prison

Edward Majerczyk’s sentencing follows him pleading guilty to felony computer hacking charges last year. An Illinois man was sentenced to nine months in federal prison on Tuesday for breaking into the email and online storage of celebrities to obtain their … Read More

Featured Post

Massive networks of fake accounts found on Twitter

Massive collections of fake accounts are lying dormant on Twitter, suggests research. The largest network ties together more than 350,000 accounts and further work suggests others may be even bigger. UK researchers accidentally uncovered the lurking networks while probing Twitter … Read More

Featured Post

The Most Common Passwords In 2016 Are Truly Terrible

The most popular one of all? “123456.” 🙈 Cybersecurity is on many people’s minds these days, and yet using “password” as a password is apparently still a thing. On Friday, password management company Keeper Security released a list of the most common passwords … Read More

Featured Post

Ransomware Rising On The Plant Floor

Cybercriminals are successfully reaching ICS/SCADA networks with their ransomware, including energy firms and manufacturing plants. S4x17 CONFERENCE – Miami, Fla. – All eyes may be on Russian and other nation-state hacking threats to power grids and other critical infrastructure facilities, … Read More

Featured Post

Allianz study says cyber risk concerns rise globally in all sectors

A new study conducted by Allianz has the cyber threat is considered as a major concern globally for businesses. Also, market developments and volatility is an important business peril in 2017 and the top concern in the aviation/defense, financial services, … Read More

Featured Post

Can hackers really hijack a plane using the in-flight entertainment system?

Stay grounded, people. There’s no direct evidence that in-flight system tampering can bring down a plane. An ethical hacker has disclosed multiple cybersecurity vulnerabilities that could be used to tamper with in-flight entertainment (IFE) systems made by Panasonic Avionics and featured in … Read More

Featured Post

Uber, Apple Maps and location tracking: what’s really going on?

When it comes to privacy, folks have learned to watch Uber like a hawk. This turns out to be useful even when Uber (apparently) turns out to be innocent. Case in point: the way Uber’s iOS app (3.222.4 and higher) now requests … Read More

Featured Post

Insurance gaps leave shipping exposed to growing cyber threats

Shipping companies grappling with the threat of cyber attacks on vessels are finding insurance policies often fall short, officials involved in both industries say, a risk that could feed through into global prices. Digitalization means electricity networks, emergency services, industry … Read More

Featured Post

This Facebook Hack Can Reveal Private Email Address Of Any FB User

You Can Check Out Any Facebook User’s Private Email Address With This Nifty Hack Tommy DeVoss, a Facebook bug bounty hunter, couldn’t have asked for a better gift from Santa this Christmas. Last week, the social media giant paid him … Read More

Featured Post

Los Angeles College Pays Hackers $28,000 Ransom To Get Its Files Back

Ransomware has turned on to a noxious game of Hackers to get paid effortlessly. Once again the heat was felt by the Los Angeles Valley College (LAVC) when hackers managed to infect its computer network with ransomware and demanded US$28,000 … Read More

Featured Post

Did You Install Super Mario Run APK for Android? That’s Malware

After the success of Pokémon Go, Nintendo’s “Super Mario Run” has become the hottest game to hit the market with enormous popularity and massive social impact. The game has taken the world by storm since its launch for iOS devices over … Read More

Featured Post

Top 10 devastating hacks that surfaced in 2016

IBTimes UK recaps the most shocking hacks, detailing how hackers wreaked havoc. Massive and shocking cyberattacks came to light in 2016. Major tech firms, government organisations and even political parties were hit with multiple high-profile attacks. Mega breaches, both old … Read More

Featured Post

8 Boldest Security Predictions For 2017

Scary, funny and maybe even a little outlandish, these industry predictions come from prognosticators who didn’t mince words. Rubber Ducky, You Make Bot Time Lots Of Fun In light of the rise of the Mirai botnet this year, we weren’t … Read More

Featured Post

Your new year’s resolution: get ready for GDPR

By 2018, the General Data Protection Regulation (GDPR) will require any company doing business in the European Union to more securely collect, store and use personal information. That means companies must have a lot of the compliance work in place as they … Read More

Featured Post

How Will Internet Security Threats Change Over the Coming Years?

What do you see as the major type of security threats in the coming 5-10 yrs as PC sales have declined and mobile nodes or IOT devices will explode? originally appeared on Quora – the knowledge sharing network where compelling questions are answered by … Read More

Featured Post

How Secure Is the Technology Protecting Your Home?

What if burglars could break into your home without ever smashing a window or picking the lock? Say the front door swung wide open to let them in, but the only one there to greet them was your jewelry box? … Read More

Featured Post

8 Most Hackable Holiday Gifts, 2016 Edition

You better watch out! Otherwise, you may be giving the gift of malware or unauthorized access to networks and devices. Like Lambs Before Lions Giving (or getting) a new computer for the holidays? Make sure you or your recipient resolve … Read More

Featured Post

Why a criminal might want to hack into your email

In the wake of two large breaches at Yahoo that compromised a billion accounts, including users’ email addresses and passwords, experts say email accounts are a major target for criminals. “When an attacker compromises your email account, his possibilities are … Read More

Featured Post

Yahoo admits leaking of 1 billion passwords

Eventually Yahoo decided to inform service users about the size of recent violations and leaks. The first hack apparently took place in August 2013 where names, email addresses, phone numbers, birth dates, fragmented passwords (with MD5) and some encrypted or … Read More

Featured Post

Ashley Madison Dating Site Agrees to Pay $1.6 Million Fine Over Massive Breach

Ashley Madison, an American most prominent dating website that helps married people cheat on their spouses has been hacked, has agreed to pay a hefty fine of $1.6 Million for failing to protect account information of 36 Million users, after a … Read More

Featured Post

In Break From Usual, Threat Actors Use RAT To Steal POS Data

New NetWire RAT version comes with keylogger for stealing a lot more than just credit and debit card data. Memory-scraping tools that surreptitiously copy and export data from running processes have pretty much been the only malware that threat actors … Read More

Featured Post

“PluginPhantom” Android Trojan Uses Plugins to Evade Detection

A recently discovered Android Trojan dubbed “PluginPhantom” abuses a legitimate plugin framework to update itself and evade static detection, Palo Alto Networks reported on Wednesday. PluginPhantom focuses on data theft and it’s capable of stealing files, contacts, location data and Wi-Fi … Read More

Featured Post

More Than 1 Million Google Accounts Breached by Gooligan

As a result of a lot of hard work done by our security research teams, we revealed today a new and alarming malware campaign. The attack campaign, named Gooligan, breached the security of over one million Google accounts. The number … Read More

Featured Post

DailyMotion Hacked — 85 Million User Accounts Stolen

Another day, another data breach. This time a popular video sharing platform DailyMotion has allegedly been hacked and tens of millions of users information have been stolen. Breach notification service LeakedSource announced the data breach on Monday after the company obtained 85.2 … Read More

Featured Post

Kangaroo Ransomware can lock you out of your PC

  The Kangaroo Ransomware is the new offering from the creator of Apocalypse ransomware. Its basic features are similar to those of other ransomware such as Locky: it encrypts files of the affected system and displays a message asking for money. … Read More

Featured Post

GPS spoofing and dangers of GPS data hacking

Hacking Global Positioning System with GPS ‘Spoofing’ Can Lead To Fatalities Imagine you are relying on Google Maps and suddenly it leads you to an unwanted/dangerous place. Up to now this would be considered a Google Maps glitch but hackers … Read More

Featured Post

Facebook Denies Ransomware Infiltration

Facebook on Monday denied that its network and Messenger app were being used to spread ransomware to its users, contradicting the claims of Check Pointresearchers Roman Ziakin and Dikla Barda. The two researchers last week reported they had discovered a new … Read More

Featured Post

San Francisco Metro System Hacked with Ransomware; Resulting in Free Rides

Nothing is immune to being hacked when hackers are motivated. The same proved by hackers on Friday, when more than 2,000 computer systems at San Francisco’s public transit agency were apparently got hacked. San Francisco’s Municipal Transportation Agency, also known … Read More

Featured Post

Researchers Show How to Steal Tesla Car by Hacking into Owner’s Smartphone

New technology is always a little scary, so are Smart Cars. From GPS system and satellite radio to wireless locks, steering, brakes, and accelerator, today vehicles are more connected to networks than ever, and so they are more hackable than … Read More

Featured Post

US Navy admits one hacked laptop leaked personal details of over 130,000 sailors

The hack exposed the names and social security numbers of current and former sailors. Hackers have managed to get their hands on personal and sensitive information of over 130,000 US Navy officials. The US Navy has acknowledged the security breach, adding … Read More

Featured Post

Hackers attack European Commission

Staff warned of cyberattack, but no data breach. The European Commission was the victim of a “large scale” cyberattack Thursday, a spokesperson said. “The attack has so far been successfully stopped with no interruption of service, although connection speeds have been … Read More

Featured Post

Deutsche Telekom ‘hack’ affects nearly a million customers

Hundreds of thousands of Deutsche Telekom customers in Germany had their broadband service cut off following a hack-attack on its hardware. At one point as many as 900,000 people suffered internet outages. That number fell to 400,000 as security measures … Read More

Featured Post

Alternative social network Ello in plaintext password glitch

Back in March 2014, an alternative social network called ello.co went live, claiming to offer an online hangout where users were just that: users, not click-generators. There was no real-name policy, either: a working email address was all you needed to sign … Read More

Featured Post

Department Of Housing And Urban Development Website Error Exposed Private Data On Thousands

In August of this year, an error on the Department of Housing and Urban Development website spilled data on as many as 600,000 individuals. Three long months after the leak happened it finally came to light after a HUD client … Read More

Featured Post

Mark Zuckerberg Outlines Plans for Fake-News Controls on Facebook

Mark Zuckerberg said Facebook will develop “stronger detection” for fake news In a post late Friday, Facebook CEO Mark Zuckerberg outlined a bevy of new initiatives to crack down on fake or misleading news. Facebook has faced intense criticism in the … Read More

Featured Post

How to keep your secrets safe on Amazon, Netflix, other sites

When a relationship gets serious, we start to share more of our lives. We borrow each other’s cars. We move in together. Inevitably, we start sharing each other’s technology and even our passwords. But your device says a lot about … Read More

Featured Post

A fully automated $5 device called PoisonTap can hack your locked computer in just one minute

The device installs a backdoor onto users’ PC allowing hackers to access victims’ online activities. A serial hacker has come up with a little USB device that can hack into any computer, even one that is password protected, with little … Read More

Featured Post

Little Doctor zero day: violating chat applications

Little Doctor: hackers wishing to gain access to popular messaging applications (chats) in order to use the camera and sound of users can do so very easily by using a worm published online. At present it is still zero day … Read More

Featured Post

Dangerous Rootkit found Pre-Installed on nearly 3 Million Android Phones

Here’s some bad news for Android users again. Nearly 3 Million Android devices worldwide are vulnerable to man-in-the-middle (MITM) attacks that could allow attackers to remotely execute arbitrary code with root privileges, turning over full control of the devices to … Read More

Featured Post

Three Mobile cyber hack: six million customers’ private information at risk after employee login used to access database

One of Britain’s biggest mobile phone companies has admitted to a major cyber-security breach which could put the personal data of millions of customers at risk. Three Mobile admitted that hackers have successfully accessed its customer upgrade database after using … Read More

Featured Post

Greek Ministry of Culture Ransomware attack!

  The ransomware attack created serious problems to a large number of terminals and the problem is still not resolved by the Ministry !According to reliable sources disclosed to SecNews editors, a Ministry of Culture service suffered from a serious … Read More

Featured Post

This Hack Gives Linux Root Shell Just By Pressing ‘ENTER’ for 70 Seconds

A hacker with little more than a minute can bypass the authentication procedures on some Linux systems just by holding down the Enter key for around 70 seconds. The result? The act grants the hacker a shell with root privileges, … Read More

Featured Post

Pre-installed Backdoor On 700 Million Android Phones Sending Users’ Data To China

Do you own an Android smartphone? You could be one of those 700 Million users whose phone is secretly sending text messages to China every 72 hours. You heard that right. Over 700 Million Android smartphones contain a secret ‘backdoor’ … Read More

Featured Post

400 Million Accounts Allegedly Stolen From FriendFinder Networks

Breach verification service LeakedSource claims it has obtained over 400 million user accounts stolen by hackers from social networking and multimedia entertainment company FriendFinder Networks, Inc. According to LeakedSource, 412,214,295 accounts have been compromised, including usernames, email addresses and passwords. The … Read More

Featured Post

IoT Malware Will Soon Surround Us: Researcher

When it comes to Internet of Things (IoT) devices, everything from smart glasses to connected cars is susceptible to malware infection if not properly secured, Fortinet senior researcher Axelle Apvrille said in a presentation at the DefCamp 2016 security conference in Bucharest, … Read More

Featured Post

China’s internet controls will get stricter, to dismay of foreign business

In August, business groups around the world petitioned China to rethink a proposed cybersecurity law that they said would hurt foreign companies and further separate the country from the internet. On Monday, China passed that law — a sign that when it … Read More

Featured Post

What are the Biggest Issues in Cyber Security in 2016?

What are the biggest issues in cyber security in 2016? You think we have cyber security issues? No way! Just kidding. This is definitely one of the most popular questions that I get these days. Obviously cyber attacks are becoming both … Read More

Featured Post

Even A Single Computer Can Take Down Big Servers Using BlackNurse Attack

Yes, you only need a single laptop with a decent internet connection, rather a massive botnet, to launch overwhelming denial of service (DoS) attacks in order to bring down major Internet servers and modern-day firewalls. Researchers at TDC Security Operations … Read More

Featured Post

SWIFT Hack: Bangladesh Bank Recovers $15 Million from a Philippines Casino

Part of the $81 Million stolen from Bangladesh bank’s New York Federal Reserve account earlier this year in the wake of the major malware attack on the SWIFT interbank transfer network has been tracked down to a casino in the Philippines. SWIFT, … Read More

Featured Post

UK in $2.3 Billion Plan to ‘Strike Back’ at Hackers

Finance minister Philip Hammond on Tuesday warned Britain will “strike back” against states hacking into strategic networks in order to avoid a military showdown, as part of a new cyber-defense plan.  Unveiling the £1.9 billion ($2.3 billion, 2.1 billion euro) … Read More

Featured Post

Tesco Bank halts all online transactions after hacking attack

Thousands of customers are understood to have been affected, with some saying hundreds of pounds are missing from their accounts. Tesco Bank has temporarily suspended all online transactions due to a hacking attack affecting thousands of customers. Some customers tweeted … Read More

Featured Post

Critical Flaws in MySQL Give Hackers Root Access to Server (Exploits Released)

Over a month ago we reported about two critical zero-day vulnerabilities in the world’s 2nd most popular database management software MySQL: MySQL Remote Root Code Execution (CVE-2016-6662) Privilege Escalation (CVE-2016-6663) At that time, Polish security researcher Dawid Golunski of Legal Hackers who discovered these … Read More

Featured Post

Hundreds Of Operations Canceled After Malware Hacks Hospitals Systems

Computer viruses do not discriminate. They are not just hacking your email and online banking accounts anymore. Computer viruses do not distinguish between a personal computer or a hospital machine delivering therapy to patients — and the results could prove … Read More

Featured Post

Someone is Using Mirai Botnet to Shut Down Internet for an Entire Country

Someone is trying to take down the whole Internet of a country by launching massive distributed denial-of-service (DDoS) attacks using a botnet of insecure IoT devices infected by the Mirai malware. It all started early October when a cybercriminal publically … Read More

Featured Post

Albanian hackers attack JP-Avax!

Albanian hackers attack a site and post message against the JP-AVAX construction  company! The J & P-AVAX SA Group is one of the most well-known construction groups in Greece. It includes companies with 7th, 6th, 4th and 3rd class contractive degrees … Read More

Featured Post

Google discloses Critical Windows Zero-Day that makes all Windows Users Vulnerable

Google has once again publicly disclosed a zero-day vulnerability in current versions of Windows operating system before Microsoft has a patch ready. Yes, the critical zero-day is unpatched and is being used by attackers in the wild. Google made the … Read More

Featured Post

The Truth Behind the Super-Dangerous Rex Botnet

The linux-based malware Rex has not yet spread to an alarming number of users nor is that dangerous as initially thought. What has been revealed so far is that it is a malware with 150 zombie-computers (bots) under its possession … Read More

Featured Post

Google’s AI creates its own inhuman encryption

What happens when you tell two smart computers to talk to each other in secret and task another AI with breaking that conversation? You get one of the coolest experiments in cryptography I’ve seen in a while. In short, Google … Read More

Featured Post

There’s now a way to hijack nearly any drone mid-flight using a tiny gadget

A researcher has developed a gadget that is capable of hijacking most drones mid-flight — locking the owner out and giving the attacker complete control over the device. Jonathan Andersson, a manager at Trend Micro’s TippingPoint DVLab, showed off his … Read More

Featured Post

This Code Injection Technique can Potentially Attack All Versions of Windows

Guess what? If you own a Windows PC, which is fully-patched, attackers can still hack your computer. Isn’t that scary? Well, definitely for most of you. Security researchers have discovered a new technique that could allow attackers to inject malicious … Read More

Featured Post

Prepare For Holiday Scams

Whether you are hoping we can “Make America Great Again,” working tirelessly for those who say that we are “Stronger Together,” or simply trying to make it through another day, it is highly likely that Christmas is the furthest thing … Read More

Featured Post

Top 10 hackers who turned activists

You should know these top 10 hackers who turned activists Hacking combined with activisms aka Hacktivism is an occurrence definite to the digital age, represents the rebellious use of computers and computer networks for a politically or socially motivated purpose. … Read More

Featured Post

How to Understand Today’s Internet Outage in 4 Words

Here’s why your favorite sites were down today A massive DDoS attack against a major DNS service likely using a botnet of IoT devices resulted in Internet issues across the eastern United States Friday, making it hard for many users to access … Read More

Featured Post

Joomla Joomla! Two Critical Flaws Discovered — Update to Protect Your Site

Joomla – the world’s second popular open source Content Management System (CMS) software packages, has just released the latest version of its CMS, which includes patches for two critical security vulnerabilities and a bug fix. The two critical flaws, both exist in the … Read More

Featured Post

New Drammer Android Hack lets Apps take Full control (root) of your Phone

Earlier last year, security researchers from Google’s Project Zero outlined a way to hijack the computersrunning Linux by abusing a design flaw in the memory and gaining higher kernel privileges on the system. Now, the same previously found designing weakness has been exploited … Read More

Featured Post

DomainTools was targeted by email harvesting campaign

DomainTools sent out an email today informing its account holders that a high volume user email harvesting campaign targeted its system and correctly matched a few hundred current or historic DomainTools account email addresses. This is the complete email sent out … Read More

Featured Post

Internet outage shows how sophisticated attacks can target your home

  Cyber crime has moved closer to home than ever. The cyber attack that slowed many popular websites to a crawl last week is attracting new scrutiny to the security of the so-called “Internet of Things.” The attack last week … Read More

Featured Post

Here’s Why Your Favorite Sites And Services Haven’t Been Working

Hackers co-opted web cameras and home routers in a massive attack that disrupted access to Twitter, Spotify and Netflix. The widespread disruption experienced across the internet on Friday was likely caused by hackers who launched a massive attack with web … Read More

Featured Post

Beware: Fake Microsoft Security Essentials installer

Wouldn’t it be a shame if, in trying to secure your PC, you inadvertently install malware and run the risk of being scammed? We recently discovered a threat detected as SupportScam:MSIL/Hicurdismos.A that pretends to be a Microsoft Security Essentials installer. Microsoft Security Essentials is our antimalware … Read More

Featured Post

Warnings over Dirty Cow Linux bug

Users of the Linux operating system are being urged to update it to remove a “serious” bug that hackers could use to hijack systems. Known as the Dirty Cow bug, the vulnerability has been present in many versions of Linux … Read More

Featured Post

Is Dyre Trojan making a comeback?

Security specialists believe TrickBot, the newest strain of malware hitting Australian banks, looks a lot like Dyre, one of the most aggressive Trojans to target the financial market. Through man-in-the-middle attacks launched weekly, Dyre manipulated web sites to meddle with the communication … Read More

Featured Post

5 Ways to Prevent Cyber Crimes From Derailing Your Business

I know that as a business person, one of your major concerns is how to make your business immune to exposure from cyber crime and its effects. Your fears are well-founded considering the increasing cases of cyber crimes, with many … Read More

Featured Post

5 Ways To Lock Down Your Login

New public awareness campaign inspired by the White House calls for users to think more carefully about stronger authentication.  1. Start by setting strong passwords. Close to three-quarters of Americans surveyed by the National Cyber Security Alliance (NCSA) believe that … Read More

Featured Post

CryPy Ransomware Slithers Onto PCs With Unique, Python-Based Encryption

Ransomware is already annoying: Files are suddenly locked down and potentially irretrievable if users aren’t wiling to meet demands and pay up. Thankfully, most strains come with inherent weaknesses that can be exploited by security firms to claw back hostage … Read More

Featured Post

9 Out Of 10 Windows Security Flaws Could Be Avoided By Just Removing Admin Rights

Short Bytes: The security firm Avecto has just released its security report on Windows operating system. The report outlines an important result stating that 9-out-of-10 Windows security flaws could be mitigated by simply removing a user’s admin rights. Almost nine-out-of-ten Windows … Read More

Featured Post

Exotic Ransomware: flirting with security researchers

A new ransomware named Exotic appeared last week and grew from version 1.0 to 3.0 within two days as its German programmer editor known as EvilTwin or Exotic Squad wants to impress security researchers with his “work of art”. It … Read More

Featured Post

Towards a Cyber Resilience Strategy

As most of you already know, October is National Cyber Security Awareness Month(NCSAM). The aim of NCSAM is to raise awareness across the international community about cyber threats, discuss best practices, and educate the public and private sector on how to stay safe … Read More

Featured Post

U.S. Considering Major Cyber Attack Against Russia: Report

The Obama administration wants the Kremlin to answer for its alleged meddling in U.S. elections. The White House has asked the CIA to plan for a potential cyber strike on Russia, according to NBC News. Unnamed intelligence officials told NBC News … Read More

Featured Post

4 easy ways to be more mindful online

Get back your mojo and fight off the FOMO with our four easy tips for lowering your stress online… 1. Block out the ads At its worst, browsing the web with ads on is like trying to read a book … Read More

Featured Post

Spotify served malware-infested ads to listeners’ computers

Multiple users claim to have experienced the issue on Windows 10 computers, MacOS and Ubuntu. Popular music-streaming service Spotify has been serving up malware-laden ads on some users’ computers, according to multiple customer reports on its community forums and social … Read More

Featured Post

Odin ransomware takes over from Zepto and Locky

First it was Locky, then it morphed into Zepto, and now it’s become Odin. That’s the latest reinvention of the Locky-turned-Zepto strain of ransomware. (We’re assuming it’s named after Odin, the mythological man who gave his name to Wednesday.) If you’re unfortunate enough … Read More

Featured Post

Largest ever DDoS attack: Hacker makes Mirai IoT botnet source code public

The botnet code that took journalist Brian Krebs and French web host OVH offline is now freely available. The botnet behind the world’s largest ever distributed denial of service (DDoS) attack that took out security journalist Brian Krebs’ website could … Read More

Featured Post

Which country has the most malware-infected devices?

Is your computer committing cybercrime? New research reveals which countries across Europe, the Middle East and Africa have the largest number of internet-connected devices infected with malware “bots” that allow criminals to use the device as part of co-ordinated cyber … Read More

Featured Post

Details of 1.5 Million “Cheaters” Exposed Due To Misconfigured Dating Site Database

Cheaters and adulterers information on multiple dating sites leaked due to misconfigured database The login details and passwords of 1.5 million people who have signed up for multiple dating websites and mobile application of a New Zealand-based online dating network … Read More

Featured Post

Amy Schumer is the most dangerous celebrity online, Intel Security finds

The research determines which celebrities churn out the riskiest search results online. Known for her outspoken ways, American comedian and actress Amy Schumer is the most dangerous celebrity on the internet, Intel security announced on Tuesday (27 September). Knocking Dutch … Read More

Featured Post

OurMine Hacking Group Hacks BuzzFeed Website

OurMine hacking group defaces BuzzFeed for publishing ‘fake news’ Do you remember “OurMine” hacking group? Couple of months earlier, this group had claimed of hacking elite accounts around the world, which included accounts of Daniel Ek, the CEO and founder … Read More

Featured Post

Turkey blocks web drives after email leak

Access to online storage systems, including DropBox, GitHub and Microsoft OneDrive, was blocked in Turkey on Saturday. The Turkish government imposed the blocks after a hacktivist group leaked emails it said it had stolen from the nation’s energy minister. The … Read More

Featured Post

Forget a cyberwall, you’re going to get hacked, say security execs

Etsy, the online crafts marketplace, now has 2 million sellers doing business on its platform, and nearly 30 million buyers. As for any company, cybersecurity is a high priority. Contrary to many companies, and the way many people think about … Read More

Featured Post

Cyber Security is Quickly Becoming a Small Business Priority

As cyber security threats increase all over the world, we’re seeing a rather significant shift in how small businesses and their owners view online security. Specifically, we’re seeing thousands of businesses ramping up their security efforts and making the issue … Read More

Featured Post

How much will a DDoS attack finally cost a business?

According to the «Corporate IT Security Risks 2016» study by Kaspersky Lab and B2B International, where more than 4.000 business representatives from 25 countries took part, a single DDoS attack can cost a business more than $1,6 million. The amount … Read More

Featured Post

Welcome to Cybersecurity Awareness Month 2016!

It’s October, and that means it’s Cybersecurity Awareness Month (CSAM). In the USA, it’s not merely CSAM, it’s officially National Cybersecurity Awareness Month, an awareness project aimed at ensuring that everyone has “the resources they need to stay safer and more … Read More

Featured Post

Yahoo Built a Secret Tool to Scan Your Email Content for US Spy Agency

Users are still dealing with the Yahoo’s massive data breach that exposed over 1 Billion Yahoo accountsand there’s another shocking news about the company that, I bet, will blow your mind. Yahoo might have provided your personal data to United States intelligence agency … Read More

Featured Post

FBI Director James Comey wants you to cover your webcam

Director of the FBI (Federal Bureau of Investigation) James Comey puts tape over his webcam and he wants you to do it too. Speaking at the recent Center for Strategic and International Studies conference on Wednesday, Comey likened covering your … Read More

Featured Post

Google Chrome To Flag Non-HTTPS Logins, Credit Card Info ‘Not Secure’

The move is part of a larger Google push to lock down Web traffic using encryption between the browser and Web server. Google’s Chrome 56 browser as of January 2017 will flag as “not secure” any non-HTTPS sites that transmit … Read More

Featured Post

Massive Malvertising Campaigns Hit Sites Worldwide

Recently observed malvertising campaigns leveraged the same redirection gate to take users from all around the world to the landing page of the Neutrino exploit kit, Cisco Talos researchers reveal. Just as other malvertising campaigns, these operations involved malicious ads, an … Read More

Featured Post

40% of Facebook users click on phishy links. Do you?

A new study has found that up to 56% of email recipients and about 40% of Facebook users clicked on a link from an unknown sender that could have been crawling with malware, for all they knew. Because curiosity. Because, … Read More

Featured Post

Scammers using social media brands to launch phishing, fraud and malware attacks, study says

Proofpoint security researchers say 600 new fraudulent social media accounts crop up every month. Businesses are now investing heavily in social media, in efforts to ensure that their brands and products attract attention, but cybercriminals have been found to be … Read More

Featured Post

APT28 is back, delivers Mac OS X Trojan to aerospace employees

The infamous APT28 group is targeting users running OS X on their computers to install spying Trojans, according to Unit 42 researchers. APT28, also known as Sofacy, is a Russian cyber-criminal group known to target high-profile government, military and security organizations … Read More

Featured Post

World’ s largest 1Tbps DDoS Attack launched from 152,000 hacked Smart Devices

Do you know — Your Smart Devices may have inadvertently participated in a record-breaking largest cyber attack that Internet has just witnessed. If you own a smart device like Internet-connected televisions, cars, refrigerators or thermostats, you might already be part … Read More

Featured Post

Network Security Monitoring Goes Beyond the SIEM

Who’s Watching Your SIEM? Congratulations! Your organization has implemented a Security Information and Event Management (SIEM) platform for network security monitoring. That’s a good thing, because SIEM can be an extremely effective tool for combating today’s advanced cyber threats, giving you real-time … Read More

Featured Post

How Hacked Cameras Are Helping Launch The Biggest Attacks The Internet Has Ever Seen

Brian Krebs knows what it’s like to face intimidation from hackers. The independent reporter has had a SWAT team called to his house by subjects of his investigations. One sent threats via flowers shaped in a cross, the kind one orders for a … Read More

Featured Post

Top 10 Passwords Used to Hijack IoT Devices

IoT botnets and IoT malware are becoming a huge concern Everything from cars to home appliances, watches and even children’s toys are being connected online. As a result, anything connected to the Internet can be hacked and so is the … Read More

Featured Post

FBI probe into NSA cyberweapons leak reveals former employee’s ‘mistake’ may have caused hack

Investigators have not yet ruled out the possibility of the Shadow Brokers being affiliated with Russia. The FBI probe into the leaked NSA cyberweapons has revealed that a former NSA employee’s “mistake” during an active operation three years ago may … Read More

Featured Post

iSpy Keylogger sold on dark web for $25 found targeting passwords, webcams and Skype

Researchers have uncovered that the malware is distributed via spam email campaigns. Security researchers have uncovered a new keylogger dubbed iSpy put up on sale on the dark web for as little as $25. Unlike other traditional keyloggers, iSpy is … Read More

Featured Post

Advisory Body Calls For Stronger Cybersecurity Measures Across Airline Industry

Measures are designed to bolster operational security across all stakeholders in the aviation sector, Wall Street Journal says.  RCTA, a private not-for profit organization that develops recommendations for performance and operational standards for the Federal Aviation Administration (FAA), has reportedly … Read More

Featured Post

IP geo-location not reliable enough to hunt down criminals, report says

Although IP geo-location is constantly developing, it may not always precisely define a location.  Because its accuracy is still debatable, it might be overestimated by police and judges. Internet Protocol addresses (IPs) are not 100 percent reliable, so law enforcement … Read More

Featured Post

What companies need to do after a major hack

Yahoo confirmed a huge data breach took place in 2014 affecting up to 500 million users on Thursday. In August, the company said it was investigating a possible breach after a hacker claiming to have stolen the account information posted … Read More

Featured Post

Image Purported To Be Michelle Obama’s Passport Posted Online

“We’re aware of those media reports, and it is something we’re looking into,” U.S. Attorney General Loretta Lynch said at a news conference. WASHINGTON (Reuters) – An image purported to be a scanned copy of U.S. first lady Michelle Obama’s … Read More

Featured Post

US lawmaker proposes new legislation to protect voting systems from hackers

Representative Hank Johnson has introduced two bills that would prohibit connecting voting machines to the internet. Amid concerns over the possibility of foreign nations meddling in the upcoming US presidential elections through cyberattacks, a US lawmaker has proposed two bills … Read More

Featured Post

Yahoo breach? Watch this

Was your information exposed in the Yahoo data breach? Change your Yahoo password right away. Then, check out this new data breach video from the FTC. The video walks you through the steps to take if your information was part … Read More

Featured Post

Security Information and Event Management (SIEM) από την Aspida Cyber Security

Η Aspida Cyber Security, ανακοινώνει το λανσάρισμα της νέας υπηρεσίας Security Information and Event Management (SIEM). Οι κυβερνοεπιθέσεις αποτελούν πλέον το μεγαλύτερο κίνδυνο όλων των εταιριών με καθημερινά συμβάντα παγκοσμίως. Οι συνέπειες ποικίλλουν από την κλοπή εμπιστευτικών δεδομένων ως και την πλήρη … Read More

Featured Post

324,000 payment cards breached, CVVs included

About two months ago, a Twitterer going by 0x2Taylor announced a sizeable data dump. More than 300,000 credit card records were uploaded to the file sharing service Mega; the data has since been removed from Mega, but not before it was widely downloaded by … Read More

Featured Post

Global cyber standards aren’t enough to secure central banks

Don’t rely on frameworks for protection. It took the theft of US$81 million earlier this year from Bangladesh’s central bank before others across the world felt compelled to take action to tighten security. Months of investigations have revealed weaknesses all across the banking … Read More

Featured Post

Don’t plug it in! Scammers post infected USB sticks through letterboxes

Unexpectedly received a USB stick in the post? Whatever you do … DON’T PLUG IT IN!! Police in the Australian state of Victoria are warning the public about cybercriminals’ latest tactic: randomly dropping unmarked USB sticks containing malware through letterboxes. … Read More

Featured Post

How one man could have deleted any Facebook page

Arun Sureshkumar has been added to Facebook’s wall of thanks and netted himself a cool $16,000 bug bounty for finding a zero-day vulnerability in Facebook Business Manager. Anyone with knowledge of the bug before it was closed could have taken over or … Read More

Featured Post

The Biggest Cybersecurity Threats Are Inside Your Company

When security breaches make headlines, they tend to be about nefarious actors in another country or the catastrophic failure of technology. These kinds of stories are exciting to read and easier for the hacked company to admit to. But the … Read More

Featured Post

Volkswagen establishes cybersecurity joint venture

The issue will only grow in importance as cars become more connected. Ask anyone who’s clicked the wrong link in an email, and you’d know that online security is ridiculously important. It’s even more important when you’re driving a connected … Read More

Featured Post

GCHQ plans ‘Great British Firewall’ to protect UK against hackers

GCHQ detected 200 ‘national security level cyberattacks’ a month last year. The Government Communications Headquarters (GCHQ), the UK’s secretive signals intelligence agency, is developing ‘automated defence’ tools – already dubbed the ‘Great British Firewall’ – to help combat a spike … Read More

Featured Post

Cybersecurity In The Obama Era

Obama Orders 60-day Review of Government InfoSec Status, Readiness In February 2009, President Obama directed the National Security Council (NSC) and Homeland Security Council to conduct a 60-day “top-to-bottom” review of the federal government’s efforts to defend the nation’s information … Read More

Featured Post

Sophisticated hackers ‘aim to put net out of action’

Unidentified hackers are carrying out a campaign to find out how to take down the net, warns a security expert. In a blogpost, security guru Bruce Schneier said “precisely calibrated” attacks on key net firms had been seen for over a year. … Read More

Featured Post

Nation States May Be Plotting Internet Takedown, Warns Cybersec Pro

Unknown attackers have been testing the defenses of companies that run critical parts of the Internet, possibly to figure out how to take them down, cybersecurity expert Bruce Schneier warned Tuesday. Large nation states — perhaps China or Russia — are … Read More

Featured Post

Public Sector Remains a High Target for Cyber Espionage, Nation State Attacks

Government agencies are no strangers to hacker attacks. Some of the biggest and most well-publicized breaches in recent years have come against public sector organizations—despite ongoing efforts to bolster the cyber security of agencies that have a huge impact on … Read More

Featured Post

How U.S. 911 Emergency Response System Can Be Hacked Through TDoS Attack

U.S. Emergency Phone System ‘911’ Can Be Easily Hacked In a report published on Friday, researchers at Israel’s Ben-Gurion University warned that hackers can compromise emergency services like 911 across entire states and potentially entire countries due to the vulnerability … Read More

Featured Post

Cyber Security Controls That Actually Make You More Efficient

Credit The need for cyber security controls has not been as important as it is now. This is due to the constant cases of cyber-attacks and cyber-crimes that are perpetrated on a daily basis. A lot of entrepreneurs have been at the … Read More

Featured Post

New ‘Fantom’ Ransomware Poses As Windows Update

Fantom malware comes disguised as a legitimate Microsoft Windows update to trick consumers and business users into downloading it. IT managers have a new ransomware threat on their radar that comes camouflaged as a Critical Windows Update to trick enterprise users … Read More

Featured Post

Sophos false positive detection ruins weekend for some Windows users

Sophos antivirus products detected winlogon.exe as malicious A bad malware signature caused Sophos antivirus products to detect a critical Windows file as malicious on Sunday, preventing some users from accessing their computers. The false positive detection flagged winlogon.exe, an important … Read More

Featured Post

Top story – OPM Congressional report

After a long investigation, the US House of Representatives Oversight Committee has published today an analysis of what happened after the massive data leak at the Office of Personnel Management (OPM) two years ago. The report shows a series of security missteps and … Read More

Featured Post

How to check if your account details have been leaked

How can you find out if your account credentials have been stolen and what can you do to bolster security on your current account? Luckily, there’s a quick and easy answer. Australian cybersecurity researcher and lecturer Troy Hunt has created an … Read More

Featured Post

How One Of Europe’s Biggest Company Fell To An Online Email Scam Causing €40 Million Loss

Online email scam causes big European firm to lose $44 million Leoni AG, Europe’s biggest manufacturer of wires and electrical cables and the fourth-largest vendor in the world, announced earlier in August that it had fallen victim to an online … Read More

Featured Post

Global Risk is Spinning Out of Control

The recently completed work of the Anthropocene Working Group, a group of scientists studying the advent of a new geologic age – the Anthropocene – went largely unnoticed until recently. The Anthropocene era, which is broadly defined by how man-made … Read More

Featured Post

All Entrepreneurs Should Be Acquainted With These Most Common Coding Languages

Most Common Coding Languages All Entrepreneurs Should Know As more and more companies are shifting their services online, whether you are an aspiring developer or a new start-up founder, it is very important to know at least one coding language … Read More

Featured Post

The biggest hacks of 2016

From the Panama Papers to DNC email leaks Dropbox leaked millions of user credentials – but what have been the other big hacks of the year? In 2016 data breaches and hacks have now become more common than ever before. … Read More

Featured Post

Dropbox hack affected 68 million accounts

Password change advised. Cloud storage company Dropbox is urging its users to update their passwords following the leak of 68 million customer details. The hack, which occurred back in 2012, prompted the company to this week reveal the passwords were stolen through … Read More

Featured Post

How to Protect Yourself Online From Cyber Criminals

The internet has become a valuable resource in the lives of many Americans. We log into the internet for work, school, doctor’s visits and more. With such a large web of information and also deception found online it can become … Read More

Featured Post

Two US state voter databases breached

Could be precursor to a larger attack ahead of presidential election. The Federal Bureau of Investigation has found breaches in Illinois and Arizona’s voter registration databases and is urging states to increase IT security ahead of the November presidential election, … Read More

Featured Post

Hacker finds a way to hack into multiple Facebook accounts

Critical Facebook security flaw allows hackers to log into multiple Facebook accounts How to hack Facebook is the most popular search term on Google but a few go past learning to the actual hacking. However, one California-based hacker tried something … Read More

Featured Post

Global Cost of Cybercrime Predicted to Hit $6 Trillion Annually By 2021, Study Says

Start saving now.The global cost of cybercrime could reach $6 trillion by 2021, according to a Cybersecurity Ventures report.  A report out by Cybersecurity Ventures predicts global annual cybercrime costs will grow to $6 trillion by 2021. While a $6 trillion … Read More

Featured Post

French firm DCNS hit with massive data leak detailing India’s $3.5bn Scorpene submarines combat capabilities

The breach leaked over 22,000 documents and may also impact national security of Australia, Malaysia, Chile and Brazil. French shipbuilder DCNS was hit with a massive data breach, resulting in classified data, pertaining to India’s $3.5bn (£2.6bn) Scorpene submarines having … Read More

Featured Post

UK becomes the world’s second most targeted nation for DDoS attacks as assaults rise over 220%

DDoS-for-hire now accounts for over 90% of all assaults, indicating a new profile of ‘top bad actors’. Distributed denial of service (DDoS) attacks have increased by a whopping 220% in the last year “with no signs of abating”, fuelled by … Read More

Featured Post

‘Massive’ Locky ransomware campaign hits hospitals in US, Japan and South Korea

The ransomware also affected manufacturing, telecom and transportation industries. The prolific Locky ransomware has set its sights on industries and primarily the healthcare sector. A “massive” campaign spotted by security researchers in August, was found to be delivering Locky via … Read More

Featured Post

5 Cyber-Security Myths We Need To Ditch

Pick a subject, any subject, and there are myths and pure nonsense that someone will buy into. Birds will die if they eat the uncooked rice flung at newlyweds. (Nope) If you eat Mentos and drink Diet Coke simultaneously your … Read More

Featured Post

Hackers Have Allegedly Stolen NSA-Linked ‘Cyber Weapons’ and Are Auctioning Them Off

The teaser data dump appears to contain legitimate attack code, some experts say. The United States government can’t seem to catch a break in cyberspace. Hackers claim to have stolen attack code from a team of sophisticated cyber spies known … Read More

Featured Post

Starwood, Marriott, Hyatt, IHG hit by malware: HEI

A data breach at 20 U.S. hotels operated by HEI Hotels & Resorts for Starwood, Marriott, Hyatt and Intercontinental may have divulged payment card data from tens of thousands of food, drink and other transactions, HEI said on Sunday. The breach follows similar attacks at Hyatt Hotels and … Read More

Featured Post

Hackers found selling US Social Security number, Netflix and email accounts for just $3

Access to social media accounts and dating websites is being sold for a couple of dollars. Inside the Dark Web there exists a thriving den of criminals where thousands of illegal goods and services are for sale — from drugs, … Read More

Featured Post

5 Tips To Stay Secure While Traveling

Summer has always been one of the most popular seasons for travel, and this year is no different. AAA estimates that 43 million Americans traveled on Fourth of July weekend this year, the highest travel volume on record. With more people on … Read More

Featured Post

Scammers exploit Google SEO to deliver ransomware and online scam

The active malicious campaign abuses Google’s featured snippets tool to display links to compromised websites. A new malicious campaign has been uncovered by security researchers, which involves cybercriminals exploiting Google’s SEO tool, featured snippets, to redirect users to compromised websites … Read More

Featured Post

Beware: If you get an email like this from your boss, it might not be legit

When the big boss says “jump,” generally employees say “how high.” Now, a new cyberscam is capitalizing on that mentality to fool its victims. “[It’s] the perfect storm for this type of fraud to happen,” said Tom Kemp, CEO of … Read More

Featured Post

Protecting GPS From Spoofers Is Critical to the Future of Navigation

GPS is vulnerable to spoofing attacks. Here’s how we can defend these important navigation signals. Just hours before U.S. president Barack Obama delivered his final State of the Union speech in January, two U.S. Navy patrol boats wandered into Iranian waters. … Read More

Featured Post

Hackers are putting U.S. election at risk

(CNN) Russia has attacked the U.S. in cyberspace in an attempt to influence our national election, many experts have concluded. We need to take this national security threat seriously and both respond and defend, despite the partisan nature of this particular … Read More

Featured Post

Democratic Party email leak points to Russia: cyber experts, U.S. officials

Cyber security experts and U.S. officials said on Monday there was evidence that Russia engineered the release of sensitive Democratic Party emails in order to influence the U.S. presidential election. The FBI said it was investigating a cyber intrusion at … Read More

Featured Post

Aussie site caught up in CryptXXX ransomware-spreading campaign

Dunlop’s site compromised, users redirected to exploit kit. Attackers are targeting business websites through a vulnerable version of the Revslider slideshow plugin for WordPress to spread the CryptXXX ransomware. Security vendor Invincea warned that the SoakSoak botnet, active since 2014, is currently … Read More

Featured Post

5 ‘Mr. Robot’ Hacks That Could Happen in Real Life

As season two of the popular TV series gets underway, we reality-check anti-hero Elliot’s hacking prowess against real-life security and attack scenarios.  Hollywood hacking films have given the job of hacker a sort of glamour, with their fast-fingered hacks taking … Read More

Featured Post

Experts warn of hacking threat at Rio Olympics

World-class athletes aren’t the only ones preparing for the Olympic Games. World-class cybercriminals are also hoping to walk away with some gold. Brazil is a country that was already notorious for its large concentration of hackers. Symantec, in its 2016 Internet Security Threat … Read More

Featured Post

Pokémon GO: PoodleCorp threatens DDoS outage on August 1

Are you a Pokémon GO fan? I can’t tell you whether I like it yet, because the darn thing won’t work on my Android. All I get is an immovable red bar at the top of the screen saying GPS signal not … Read More

Featured Post

WikiLeaks under ‘sustained attack’ after announcing release of Turkey docs

Document-leaking organization suggests the Turkish government might be behind attack. WikiLeaks on Monday said its site is under an ongoing attack after announcing it would release a trove of documents detailing Turkey’s political power structure. “Our infrastructure is under sustained … Read More

Featured Post

Cyber Security Attacks = Need to get trained.

Every day another hack. Another breach. Someone’s data getting exfiltrated, dumped and sold. Is it you today? Your company? Your organization? How often do you hear about someone you know dealing with either identity theft, compromised banking or social media credentials or their … Read More

Featured Post

Intel Security reveals Brits’ riskiest holiday destinations for online security

About 42% of Brits say the mere thought of being unplugged while on holiday makes them feel anxious. The summer holiday season is well underway with millions across the globe taking a much-needed break, getting away from it all. Revealing … Read More

Featured Post

Overeager ‘Pokemon Go’ fans are an opportunity for cybercriminals, cybersecurity expert says

The release of “Pokemon Go” has sparked a frenzy among players and prompted a raft of warnings from lawmakers eager to prevent fans from putting their lives in danger. But the fevered anticipation of the game has also created opportunities … Read More

Featured Post

State-Sponsored SCADA Malware targeting European Energy Companies

Security researchers have discovered a new campaign targeting energy companies in Western Europe with a sophisticated malware that almost goes to great lengths in order to remain undetected while targeting energy companies. Researchers from SentinelOne Labs discovered the malware, which … Read More

Featured Post

The dark side of Pokemon Go

The wildly successful release of Pokemon Go hasn’t exactly been all fun and games. The new, “augmented reality” smartphone game, in which players try to capture cute digital monsters overlaid on real-world settings, has already spawned its share of problems … Read More

Featured Post

Microsoft: Cerber Ransomware dominating!

According to statistical data published by Microsoft yesterday, Cerber ransomware is responsible for the one fourth of total ransomware detections in the past 30 days. Most security companies, apart from Microsoft, have mentioned Cerber ransomware campaigns in their blogs during … Read More

Featured Post

Critical Print Spooler Bug allows Attackers to Hack any version of Microsoft Windows

Microsoft’s July Patch Tuesday offers 11 security bulletins with six rated critical resolving almost 50 security holes in its software. The company has patched a security flaw in the Windows Print Spooler service that affects all supported versions of Windows ever released, which if … Read More

Featured Post

UK Network Rail: British transport system had four cyberattacks in one year

Cyber criminals could access trains, computer networks or message boards. Four major cyberattacks have been reported on UK railway computer networks over the past year, according to new statistics revealed by UK-based security firm Darktrace, which is employed to guard … Read More

Featured Post

Data related to major sporting events vulnerable to hacking

Sensitive information may be stolen and sold by hackers in the betting market. Some major sporting events and tournaments are scheduled to take place this year making these events and sensitive data related to the teams participating vulnerable to hacking, … Read More

Featured Post

Obama says U.S. government must improve cyber security

U.S. President Barack Obama said on Sunday that the U.S. government has to improve its cyber security practices for the modern age of smart phones and other technology, saying that hackers had targeted the White House. “I am concerned about … Read More

Featured Post

Negligent Data Loss: Is Your Enterprise Invested in Employee Education?

Sixty-six percent of data protection leaders admit that employees are the weakest link in an enterprise’s security posture, and 55 percent of organizations have had a security incident or data breach due to a malicious or negligent employee, according to … Read More

Featured Post

ΔΕΛΤΙΟ ΤΥΠΟΥ

Αθήνα, 27 Ιουνίου 2016 ΔΕΛΤΙΟ ΤΥΠΟΥ Gold Partners Aspida Cyber Security και Blue Soft & IT Η Aspida Cyber Security, μέλος του Ομίλου Aspida, ανακοινώνει τη συνεργασία της ως “Gold Partner” με τον κορυφαίο κατασκευαστή λογισμικού ασφαλείας Bitdefender ο οποίος … Read More

Featured Post

Crypto-ransomware hit 718,000 users in the last year, figures show

Crypto-ransomware infections have increased five-fold to hit 718,000 users in the last year, according to new figures. 718,536 users were hit with encryption ransomware between April 2015 and March 2016, according to Kaspersky Lab – an increase of 5.5 times … Read More

Featured Post

TalkTalk profits halve after cyber attack

Telephone and broadband provider Talktalk saw profits more than halve following a hack attack on its systems last October. Profits fell to £14m compared with £32m a year earlier. That fall is partly due to the costs of last year’s … Read More

Featured Post

GoToMyPC passwords reset after cyber-attack

Many people use GoToMyPC to get remote access to their home and work computers Passwords for every GoToMyPC account are being reset following a “sophisticated” attack on the service. Many people use GoToMyPC to obtain remote access to home and … Read More

Featured Post

Hack attack drains start-up investment fund

Virtual currencies use code to log what everyone does with the digital coins or tokens they own Hackers have taken control of virtual cash worth $60m (£41m) by exploiting a bug in a system designed to help start-ups. The attack … Read More

Featured Post

Cybercriminals Use New Tricks in Phishing Attacks

Researchers have observed phishing attacks where cybercriminals used some new tricks to avoid raising suspicion and make their operations more efficient. An increasing number of cybercrime groups have come to realize that phishing attacks aimed at business executives can be highly … Read More

Featured Post

North Korea mounts long-running hack of South Korea computers, says Seoul

North Korea hacked into more than 140,000 computers at 160 South Korean firms and government agencies, planting malicious code under a long-term plan laying groundwork for a massive cyber attack against its rival, police in the South said on Monday. … Read More

Featured Post

‘Alarming’ rise in ransomware tracked

The Petya ransomware makes a computer unusable until a ransom is paid Cyber-thieves are adopting ransomware in “alarming” numbers, say security researchers. There are now more than 120 separate families of ransomware, said experts studying the malicious software. Other researchers … Read More

Featured Post

Zuckerberg’s social media accounts targeted by hackers

He might run the world’s biggest social networking site, but not even Mark Zuckerberg is immune to being hacked. The Facebook founder’s accounts on sites including Instagram, Twitter, LinkedIn and Pinterest appear to have been briefly compromised on Sunday. A … Read More

Featured Post

‘Significant’ number of TeamViewer accounts hacked

Millions of people use TeamViewer to access home and work machines when they are out and about Remote login software TeamViewer beefs up its security controls following a spate of users reporting their accounts have been hacked. Installed on millions … Read More

Featured Post

Report Details Trends in Retail Fraud; Mobile Fraud to Increase

Mobile fraud is a challenge for merchants, and will only intensify, according to the 2016 LexisNexis True Cost of Fraud Study. The study found that fraud cost as a percentage of revenues is higher among mCommerce merchants; there is greater concern … Read More

Featured Post

Study Says Organizations Not Doing Enough to Prevent Employee-Caused Security Incidents

While employee-related security risks are the number-one concern for security professionals, organizations are not taking adequate steps to prevent negligent employee behavior. The study, Managing Insider Risk Through Training & Culture, from Experian Data Breach Resolution and the Ponemon Institute, asked … Read More

Featured Post

Ponemon Study: 89 Percent of Organizations Experienced Data Breaches

It’s a turbulent time for the healthcare industry: patient data is under siege and hospitals are big targets for cyberattacks—according to the Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data, conducted by Ponemon Institute. For the second year … Read More

Featured Post

9 Important Elements to Corporate Data Security Policies that Protect Data Privacy

In recent years, high-profile stories have thrust the issue of data privacy and data security into the public eye.  Unfortunately, efforts to pass consistent laws governing consumer privacy and data security are lagging far behind where they should be. Not … Read More

Featured Post

Cyber attacks: Two-thirds of big UK businesses targeted

Two-thirds of big UK businesses have been hit by a cyber attack in the past year, according to government research. Most of the attacks involved viruses, spyware or malware, the Cyber Security Breaches Survey says. A quarter of large firms … Read More

Featured Post

After Bank of Greece, Cyprus Central Bank also reports cyber attack

A man walks out of the main entrance of the Central Bank of Cyprus in Nicosia February 22, 2013. REUTERS/YORGOS KARAHALIS The website of the Central Bank of Cyprus briefly came under cyber attack, days after a hacking collective said … Read More

Featured Post

Cybersecurity Breaches Hit Nearly Three in Four Organizations

Nearly three out of four organizations have been plagued by at least one security breach or incident in the past year, with about 60 percent of breaches categorized as serious, according to a new report by CompTIA. The International Trends … Read More

Featured Post

Anonymous attack Greek central bank, warns others

A protester wearing a Guy Fawkes mask, symbolic of the hacktivist group ”Anonymous”, takes part in a protest in central Brussels January 28, 2012. REUTERS/YVES HERMAN Greece’s central bank became the target of a cyber attack by activist hacking group … Read More

Featured Post

Nearly Two-Thirds of U.S. Adults’ Social Media Accounts Have Been Hacked

As the prominence of social media has grown, so too has the number of criminals preying on those who use it. According to a survey by the University of Phoenix, nearly two in three U.S. adults who have personal social … Read More

Featured Post

Online scams ‘target Apple customers for richer pickings’

Cybercriminals are targeting people using Apple products as they are more likely to have disposable income, a security expert has warned. Blogger Graham Cluley said that while malware was more common on Windows, Apple customers could not “afford to be … Read More

Featured Post

Phishing email that knows your address

A new type of phishing email that includes the recipient’s home address has been received by thousands of people, the BBC has learned. Members of the BBC Radio 4’s You and Yours team were among those who received the scam emails, claiming … Read More

Featured Post

7 Steps to Better Data Security Data Security

Cybersecurity is a topic so broad that the NIST Framework addresses the concept of “Data Security” as just one of 22 important risk categories. Found within the “Protect” function of the Framework, data security risk management can be broken down … Read More

Featured Post

Protecting the brand—cyber-attacks and the reputation of the enterprise

West Coghlan Cyber-criminals are assaulting every part of the enterprise. But not all cyber-attacks are created equal. In the minds of senior executives, the greatest danger of cyber-attacks is damage to the reputation of the firm with its customers. The … Read More

Featured Post

CEO email scam is wake-up call for boards

Stefan Stern Fake emails apparently sent by chief executives to senior employees asking for money transfers are estimated to have cost businesses as much as $2bn in the past two years, the FBI has said. There have been more than 12,000 corporate … Read More

Featured Post

Real pirates used hacking techniques to raid a shipping company

Real pirates have hacked into a shipping company to locate valuable cargo before hijacking vessels in targeted attacks. Technology meets Piracy. The technology is enlarging our surface of attack in a dramatic way, every company in every industry is potentially a … Read More

Featured Post

3 Steps to Better Cybersecurity Training

The NIST Framework lists “awareness and training” as a key component of network protection. But how do you go about it? For its part, NIST recommends role-based training. In theory, your company should incorporate its most important physical, administrative, and … Read More

Featured Post

The Changing Cybersecurity Landscape in 2016

In the past few years a number of high-profile data breaches have garnered widespread media attention resulting in greater general scrutiny and awareness of the need for network security. Legislators, in particular, have taken notice, evidenced by a number of … Read More

Featured Post

Nearly 80 Percent of German Organizations Aren’t Prepared for a Cyber Security Incident

The latest research on Cyber Resilience from the Ponemon Institute shows that 79 percent of security executives reported that they aren’t prepared for a cybersecurity incident. And only 21 percent have the technology in place to respond to a cyberattack. … Read More

Featured Post

By 2020, 50 Billion Devices Will Be Vulnerable to Cyberattacks

By 2020, there will be 50 billion Internet-connected devices in use, and each one will provide an entry point for hackers. In addition, according to Jason Porter, VP Security Solutions for AT&T, which handles about a third of U.S. Internet, … Read More

Featured Post

The 25 Worst Passwords of 2015

Password management company SplashData released its annual round-up of the worst passwords of 2015. The report is based on more than 2 million passwords that leaked online during the year. One trend the company found in 2015 is that while … Read More

Featured Post

Internet of Things: A Hacker’s Wonderland in the Enterprise

Last year’s holiday season saw a large number of families giving or receiving connected devices. Apple Watches, Samsung Smart TVs, connected home devices, Internet-enabled toys like Hello! Barbie and Star Wars droids were last year’s hot gift items. Enterprises need to be … Read More

Featured Post

Uber Settles With New York AG After ‘Playing God’ With Data

New York Attorney General Eric Schneiderman on Thursday announced a deal that would require Uber to encrypt geolocation information about its riders, as well as enhance its data security practices. The AG opened an investigation into Uber in 2014, in … Read More

Featured Post

Hackers block Russian minister’s cyber account with Turkish symbols

Russia’s Telecoms Minister Nikolai Nikiforov attends an interview with Reuters at his office in Moscow December 9, 2013. REUTERS/SERGEI KARPUKHIN A social network account of Russia’s communications minister was temporarily blocked on Sunday in a cyberattack carried out by hackers … Read More

Featured Post

BBC reports own websites hit by cyber attack

BBC workers place barriers near to the main entrance of the BBC headquarters and studios in Portland Place, London, Britain, July 16, 2015. REUTERS/PETER NICHOLLS The BBC’s [TBBC.UL] online services, including its news website and iPlayer catch-up TV platform, were … Read More

Featured Post

Is Cybercrime Just a Cost of Doing Business?

Where cybercrime is going and what you can do about it Is cybercrime, once an annoyance, now an ever-present threat, next just a cost of doing business? The evolution of malicious code, attacker motivations, and technical capabilities has taken us … Read More

Featured Post

13 Million MacKeeper Users Exposed

The makers of MacKeeper — a much-maligned software utility many consider to be little more than scareware that targets Mac users — have acknowledged a breach that exposed the usernames, passwords and other information on more than 13 million customers … Read More

Featured Post

EY Identifies Top Fraud and Corruption Trends for 2016

EY Fraud Investigation & Dispute Services (FIDS) announced top fraud and corruption trends for 2016, which include a dramatic rise in geopolitical instability and persistent cyber-attacks that are pushing organizations to be more vigilant about planning to guard against, and … Read More

Featured Post

Forces That Will Reshape the IT Landscape in 2016

There may be no better way to capture the state of the technology industry than to borrow Charles Dickens’ famous opening from A Tale of Two Cities: “It was the best of times, it was the worst of times…” It never … Read More

Featured Post