Cheap DDoS for Hire services discovered on a Freelancer-finding site http://securityaffairs.co/wordpress/47708/cyber-crime/cheap-ddos-booter-services.html #securityaffairs #DDoS #AaaS #hacking

Cheap DDoS for Hire services discovered on a Freelancer-finding site

securityaffairs.co

Nuclear EK 1

Creators of the Nuclear EK are gaining nearly 100K USD each month

securityaffairs.co

Next-gen Tor is arriving and it will include a distributed random number generator http://securityaffairs.co/wordpress/47683/deep-web/distributed-tor-random-number-generator.html #securityaffairs #deepweb #Tor #darknet

Next-gen Tor is arriving and it will include a distributed random number generator

securityaffairs.co

Ransomware

DMA Locker Ransomware has been significantly improved

securityaffairs.co

Hacker Interviews – Speaking with Samy Kamkar http://securityaffairs.co/wordpress/47673/hacking/interview-samy-kamkar.html #securityaffairs #hacking #SamyKamkar

Hacker Interviews – Speaking with Samy Kamkar

securityaffairs.co

@OssInformatica @_odisseus #Pastejacking attack relies on your clipboard as an attack vector http://securityaffairs.co/wordpress/47665/hacking/pastejack-attack.html #securityaffairs

Pastejacking attack relies on your clipboard as an attack vector

securityaffairs.co

FBI warns of KeySweeper keystroke loggers disguised as USB phone chargers http://securityaffairs.co/wordpress/47637/hacking/fbi-notification-keysweeper.html #securityaffairs #KeySweeper #FBI #keylogger l

FBI warns of KeySweeper keystroke loggers disguised as USB phone chargers

securityaffairs.co

Operation Ke3chang malware

Operation Ke3chang, alleged Chinese hackers target Indian Embassies Worldwide

securityaffairs.co

Turla Ruag attack Melani

Cyberespionage against RUAG, from Red October to Turla, who is the culprit?

securityaffairs.co

Magnitude EK authors are integrating exploit code for CVE-2016-4117 Adobe flaw http://securityaffairs.co/wordpress/47598/malware/magnitude-ek-cve-2016-4117.html #securityaffairs #MagnitudeEK

Magnitude EK authors are integrating exploit code for CVE-2016-4117 Adobe flaw

securityaffairs.co

Criminals steal $13m in three hours from ATMs across Japan http://securityaffairs.co/wordpress/47590/cyber-crime/japan-attack-atms.html #securityaffairs #hacking #banking #ATMs

Criminals steal $13m in three hours from ATMs across Japan

securityaffairs.co

Microsoft warns of malicious macros using a new sneaky trick http://securityaffairs.co/wordpress/47559/malware/malware-macros.html

Microsoft warns of malicious macros using a new sneaky trick

securityaffairs.co

A dangerous Worm is infected outdated Ubiquiti Devices worldwide

A dangerous Worm is infected outdated Ubiquiti Devices worldwide

securityaffairs.co

Audio Fingerprinting tracking technique

Audio fingerprinting being used to track Internet users

securityaffairs.co

Lawsuit claims Facebook scanned private messages to make profits http://securityaffairs.co/wordpress/47514/social-networks/facebook-private-messages.html #securityaffairs #Facebook #privacy #lawsuit

Lawsuit claims Facebook scanned private messages to make profits

securityaffairs.co

How to trigger DoS flaws in CISCO WSA. Apply fixes asap http://securityaffairs.co/wordpress/47484/hacking/cisco-wsa-vulnerabilities.html #securityaffairs #CISCO #WSA #hacking

How to trigger DoS flaws in CISCO WSA. Apply fixes asap

securityaffairs.co

Telephone metadata by NSA can reveal deeply personal information http://securityaffairs.co/wordpress/47492/intelligence/nsa-telephone-metadata.html #securityaffairs #NSA #surveillance

Telephone metadata by NSA can reveal deeply personal information

securityaffairs.co

Teslacrypt decryption tool allows victims to restore their files http://securityaffairs.co/wordpress/47471/malware/teslacrypt-decryption-tool-2.html #securityaffairs #Teslacrypt #decryption #ransomware

Teslacrypt decryption tool allows victims to restore their files

securityaffairs.co

A hacker who goes by the name “Peace,” is offering 117 million LinkedIn credentials for 5 bitcoin, the precious data come from the 2012 hack.

117 Million LinkedIn credentials offered for sale

securityaffairs.co

GhostShell Tweet

Hacker Interviews – Speaking with GhostShell

securityaffairs.co

The vulnerability CVE-2016-4010 allows an unauthenticated attacker to execute PHP code at the vulnerable Magento server and fully compromise the shop.

CVE-2016-4010 – Watch out a critical bug can fully compromise your Magento shop

securityaffairs.co

Skimer malware evolves, it is used to target ATMs

Skimer malware evolves, it is used to target ATMs

securityaffairs.co

Bank Hack - How to steal $25 Billion with a few lines of code http://securityaffairs.co/wordpress/47420/security/25-billion-bank-hack.html #securityaffairs #mobile #banking #hacking

Bank Hack – How to steal $25 Billion with a few lines of code

securityaffairs.co

GhostShell is back and exposed data from 32 companies hacked through Open FTP http://securityaffairs.co/wordpress/47408/hacktivism/ghostshell-is-back.html #securityaffairs #GhostShell #hacktivism #hacking

GhostShell is back and exposed data from 32 companies hacked through Open FTP

securityaffairs.co

A bug in the Symantec Antivirus Engine allows remote memory exploitation http://securityaffairs.co/wordpress/47409/hacking/symantec-antivirus-engine-bug.html #securityaffairs #Symantec #Antivirus #hacking

A bug in the Symantec Antivirus Engine allows remote memory exploitation

securityaffairs.co