Malicious hackers stealing cash from cardless ATM using a new form of SMS phishing attack that force let user give away their bank account credentials into the phished website. Cardless ATM is now using various financial institutions to take users cash without any form of physical cards but only using […]
Hacking
Intel CPUs impacted by new PortSmash side-channel vulnerability
Intel processors are impacted by a new vulnerability that can allow attackers to leak encrypted data from the CPU’s internal processes. The new vulnerability, which has received the codename of PortSmash, has been discovered by a team of five academics from the Tampere University of Technology in Finland and Technical […]
Google’s stealthy sign-in sentry can pick up pilfered passwords
Two things happened on Halloween with a bearing on cybersecurity. The first is that the 15th year of the National Cyber Security Awareness Month (NCSAM) came to an end. You have heard of NCSAM, right? The second, apparently timed to coincide with 31 October, was that Google is yet again modifying the background security […]
Cyberattaques contre les agences de voyage
Cyberattaques contre les agences de voyage: la FTAV et Amadeus en campagne de sensibilisation 111 billets d’avion pour une valeur de 350 MD émis frauduleusement par des hackers sur le dos des agences de voyage tunisiennes entre 2011 et 2018. C’est le constat amer fait par Amadeus Tunisie, principal GDS fournisseur de solutions technologiques […]
Méfiez-vous de cette arnaque très sophistiquée !
Une opération d’hameçonnage (phishing en anglais) a touché ces derniers jours un grand nombre d’utilisateurs des services de messagerie sous la forme d’un mail envoyé par un contact qui vous conseille de changer immédiatement votre mot de passe au motif qu’ il a été piraté par des hackers. Une manipulation […]
Russian hackers compromise 120 million Facebook accounts; private messages on sale online
Facebook has fallen victim to countless security breaches and November brings even more bad news for the social network. Russian hackers are selling private conversations of at least 81,000 Facebook accounts at 10 cents per account, writes the BBC. According to the BBC Russian Service, which communicated with the hackers, the criminals […]
Two Zero-Day Bugs Open Millions of Wireless Access Points to Attack
Called BleedingBit, this vulnerability impacts wireless networks used in a large percentage of enterprise companies. Two zero-day vulnerabilities in Bluetooth Low-Energy chips made by Texas Instruments (and used in millions of wireless access points) open corporate networks to crippling stealth attacks. Adversaries can exploit the bugs by simply being approximately […]
PoC Exploit Compromises Microsoft Live Accounts via Subdomain Hijacking
Poor DNS housekeeping opens the door to account takeover. A proof-of-concept (PoC) attack details how an attacker can gain access a victim’s Microsoft Live webmail session, without having the person’s credentials. It relies upon the hijack of a Microsoft-owned Live.com website subdomain. The PoC, developed by CyberInt, demonstrates what it […]
Beware! Downloader Malware Disguised as Game Apps Found On Google Play with More Than 51,100 Installations
The downloader malware dubbed Android.DownLoader.819.origin malware found on Google play downloaded by more than 51,100 Android users. The downloader malware is capable of installing other malicious applications on the affected devices and launches them. Doctor Web security researchers found 14 copies of the malicious application distributed by Quoac developer disguised as […]
BLEEDINGBIT Bluetooth flaws in TI chips expose enterprises to remote attacks
Two vulnerabilities in new Bluetooth chip, dubbed BLEEDINGBIT expose millions of access points and other networking devices to remote attacks. Security experts from the IoT security firm Armis, the same that found the BlueBorne Bluetooth flaws, have discovered two serious vulnerabilities in BLE chips designed by Texas Instruments. The flaws, dubbed BLEEDINGBIT by Armis, could be exploited by a […]