Search Results

Three new vulnerabilities in the Open Source CRM EspoCRM: PHP File Inclusion, Improper Access Control and Reflected Cross-Site Scripting. Danger level: High Availability Corrections: Yes Number of vulnerabilities: 3 CVSSv2 Rating: (AV: N / AC: H / Au: N / C: C / I: C / A: C / E: U / RL: OF / […]

A botnet, called Qbot, to have infected over 500,000 systems. Proofpoint security researchers have published an analysis that exposes the inner workings of a cybercrime operation targeting online banking credentials for banks in the United States and Europe. According to Proofpoint, attacks by type drive-by-dovnload carried out with the help of compromised sites on the […]

Cyber Security: Hot Weekly News – September 19, 2014 #1. Virus Citadel has become an instrument for making targeted attacks Banking Trojan got a number of new features and is currently used in the attacks on the Middle East petrochemical companies. Hackers who commit targeted attacks, began to use an improved version of the malware […]

The Botnet infected Linux-servers which used a vulnerable version of Apache Tomcat, Apache Struts and Elasticsearch. Experts of Akamai-Prolexic discovered a botnet known as IptabLes and IptabLex. It was used to carry out DDoS-attacks on the DNS-servers and other objects of the network infrastructure. Victims of botnet became misconfigured Linux-servers. According to experts, in the […]

Hot Cyber Security Weekly News Dear readers, today we offer you a selection of the five  hot news in the field of Cyber Security over the past week: Slider Revolution Plugin Critical Vulnerability Being Exploited; Microsoft, eBay apps open to man-in-the-middle MITM attacks; A previously unknown variant of the APT backdoor XSLCmd – OSX.XSLCmd; Hackers […]

October is Cyber Security Awareness Month. As the month comes to an end, has your business taken the necessary measures to protect itself against an attack? Each year, National Cyber Security Awareness Month serves as a reminder that businesses should have measures in place to protect against attacks. One malware attack can take an entire […]

This article focuses on the dangers of cyber bullying on kids and teens and how parents can safeguards their kids digital world from cyber bullying and its negative effects on the kid’s emotional and psychological well-being. Bullies have been around for ages but the advent of the Internet has offered bullies a new platform to […]

Of special interest this half year: the increasing use of exploit-based attacks targeted against the Java development platform. Four of five most frequently exploited vulnerabilities are present in Java. Java was the most targeted development platform for exploit attacks during the first half of the year. Finnish antivirus developer F-Secure has published a report on […]

According to a recent study by Google, malicious software in most cases extends straight from legitimate sites that have been hacked. Of course, these programs are also distributed through special sites that were directly run by hackers, but they are much smaller. These data are published in a special section of the “Report on the […]

The number of Internet users, faced with phishing attacks over the past 12 months increased by 87% – from 19.9 to 37.3 million. Most often the victims of cyber threats become residents of Russia, the U.S., India, Vietnam and the UK. These are the results of the study “The Evolution of phishing attacks in 2011-2013” […]