Archive
Hackers compromising checkout process on retail sites, redirecting shoppers to phishing page
Here’s a two-for-one deal that no retail customer wants: Researchers at Sucuri has uncovered a sampling of novel e-commerce attacks that combine the classic duplicity of phishing schemes with the insidiousness of malicious webpage redirects. According to a Sucuri blog
The federal authorities have finally arrested the alleged mastermind behind the world’s largest and most notorious BitTorrent distribution site KickassTorrents (KAT), the US Justice Department announced on Wednesday. After The Pirate Bay had suffered copyright infringement hardship, KickassTorrents (KAT) became
We just cannot imagine our lives without smartphones, even for a short while, and NSA whistleblower Edward Snowden had not owned a smartphone since 2013 when he began leaking NSA documents that exposed the government’s global surveillance program. Snowden fears
Beware: DDOS attacks a greater threat than ever
DDoS attacks are on the increase with an average of 124,000 attacks per week over the last 18 months reported by one security solutions provider who warns that there is a continuing escalation in both the size and frequency of
CrowdStrike Evaluated in Gartner’s Comparison of Endpoint Detection and Response Technologies and Solutions
Leading analyst firm Gartner has recently published a comparative assessment called Comparison of Endpoint Detection and Response Technologies and Solutions*. This is the first direct competitive analysis of endpoint detection and response (EDR) vendors. The report provides an assessment of
Every day, almost one million malware threats are introduced in the ceaseless jungle that is the internet. And yet, software developers, security experts, and IT administrators are expected to stay up-to-date with these latest threats to ensure that network environments
The IT peripherals-to-mobile phones company Intex Technologies is now using robot-assisted technology for almost everything at its manufacturing unit in Noida with an aim to provide best products to its customers, a top executive of the domestic company said here. “First we
Microsoft and the U.S. government are in an ongoing battle over an Irishman allegedly involved in Silk Road wanted by the FBI on darknet drug charges, as reported by Deep Dot Web. The 27-year-old Irishman, Gary Davis, from Wicklow, is
An attack on The Bank of Bangladesh, according to BAE Systems, was carried out using malware that targeted SWIFT’s Access Alliance software and changed code to alter a database recording the bank’s activity. However, the findings did not reveal how
Avid Life Media (ALM), the parent company of hacked adultery website Ashley Madison, is facing a US Federal Trade Commission (FTC) probe over its use of automated software called ‘fembots’ on its websites, which impersonated real women to lure in
Sharp rise in identity fraud as scammers use Facebook and other social media sites to hunt for information
Fraudsters are increasingly using social media sites such as Facebook, Twitter and LinkedIn as a “hunting ground” for personal information, leading to huge rise in identity theft, according to a new report. The number of victims of identity theft rose by
There have been significant developments in the biometric industry over the past decade – leading to systems that are an order of magnitude faster, smaller and cheaper than before. Accuracy improvements, including the layering of biometrics, help keep the bad
Ataturk Airport attack: Anonymous hackers launch ‘OpIstanbul’ despite declaring war on Turkey
The hacktivist group Anonymous has launched a fresh campaign aimed at disrupting pro-Islamic State (Isis) websites and social media accounts following the terrorist attack at Turkey’s Atatürk Airport on 28 June. In the aftermath of the tragic attack, Anonymous-linked hackers
A researcher has found that some of Google’s devices running Qualcomm components have full encryption vulnerable to a bypass. If recent reports are to be believed, millions of Android devices using full disk encryption are at serious risk from hackers.
While a group which claims to be made up of ethical hackers has been on the trail of the suddenly-disappeared HashOcean for over a week, it finally announced the breakthrough that it has had direct contact with the defunct Bitcoin
The hacker who claims to have breached the servers of the Democratic National Committee (DNC) in the US has denied any connections with Russia. He is known as Guccifer 2.0 and denied the allegation of CrowdStrike, a security company investigating