- Security Blog
- By Eduard Kovacs
- February 24th, 2014
SQL Injection Vulnerability on Tesla Motors’ Website Exposed Customer Records
The security hole was fixed shortly after being reported
- Security Blog
- By Eduard Kovacs
- February 22nd, 2014
Cybercriminals Are Adapting Ransomware Tactics to Local Markets
Trend Micro researchers have analyzed attacks aimed at users in Turkey and Hungary
- Security
- By Eduard Kovacs
- February 22nd, 2014
Experts Find WhatsApp Vulnerabilities That “the NSA Would Love”
Fortunately, the company rushed to address most of the issues
- Security Blog
- By Eduard Kovacs
- February 22nd, 2014
Cybercriminals Trick Mobile Users into Paying $5 / €3.6 for Flash Player
The scheme is powered by a piece of malware designed to target Android users
- Virus alerts
- By Eduard Kovacs
- February 21st, 2014
Leak of iBanking Bot Source Code Opens Up New Opportunities for Cybercriminals
RSA researchers have found the source code on a forum
- Security Blog
- By Eduard Kovacs
- February 21st, 2014
Mistake Made by BitCrypt Developers Allows Experts to Recover Encrypted Files
Not all ransomware is as unbreakable as CryptoLocker
- Security Blog
- By Eduard Kovacs
- February 21st, 2014
Flaw in Tinder Dating App Allowed Hackers to Determine the Exact Location of Any User
Researchers from Include Security are the ones who found and reported the vulnerability
- Security
- By Eduard Kovacs
- February 21st, 2014
Operation GreedyWonk: Flash Zero-Day Used in Attack on Visitors of Foreign Policy Sites
Security researchers from FireEye have analyzed the campaign
- Security
- By Eduard Kovacs
- February 21st, 2014
Internet Bug Bounty Pays First $10,000 / €7,300 Reward for Adobe Flash Vulnerability
The researcher who got the reward isn’t the one who discovered the security hole
- Security Blog
- By Eduard Kovacs
- February 20th, 2014
Shodan Introduces Shodan Maps Add-on
Users have to pay a $19 (€13.8) one-time fee to get the new add-on
- Virus alerts
- By Eduard Kovacs
- February 20th, 2014
Experts Discover New ZeuS Variant Designed to Target Salesforce.com Customers
Security researchers from Adallom have analyzed the new type of attack
- Security Blog
- By Eduard Kovacs
- February 20th, 2014
XSS Vulnerability Found in WikiLeaks’ Internal Search Engine
The security hole was addressed within hours after being discovered
- Security
- By Eduard Kovacs
- February 19th, 2014
Two Different Cybercriminal Groups Are Using IE 10 Zero-Day in Their Operations
Researchers from Seculert have reached a different conclusion than ones from Websense
- Security Fixes and Improvements
- By Eduard Kovacs
- February 18th, 2014
Over 500,000 Belkin WeMo Home Automation Devices Vulnerable to Hacker Attacks
Security researchers from IOActive have analyzed the devices
- Security Blog
- By Eduard Kovacs
- February 18th, 2014
ZeuS Trojan Configuration File Disguised as Harmless Image
Cybercriminals use steganography to make sure the original file is not damaged
- Security
- By Eduard Kovacs
- February 17th, 2014
Linksys Is Preparing Firmware Fix to Protect Users Against “TheMoon” Worm
A proof-of-concept exploit has been published online
- Security
- By Eduard Kovacs
- February 17th, 2014
Kaspersky Says Computrace Is Vulnerable, Absolute Software Denies Accusations
Experts say the tool can be a powerful weapon for cybercriminals