One of every 200 Google search autocomplete suggestions are poisoned and are used to drive traffic to misleading sites, to malware, or other malicious content, a team of academics from three US universities has discovered. This is one of the most recent types of blackhat search engine optimization (BHSEO) techniques […]
Hacking
INTEL DETAILS CPU ‘VIRTUAL FENCES’ FIX AS SAFEGUARD AGAINST SPECTRE, MELTDOWN FLAWS
Intel introduced hardware-based protections to its new chips to protect against the Spectre and Meltdown flaws that rocked the silicon industry when the vulnerabilities were made public in early 2018. Spectre and Meltdown, which account for three variants of a side-channel analysis security issue in server and desktop processors, could […]
Preventing Business Email Compromise Requires a Human Touch
Human-powered Intelligence Plays a Critical Role in Defending Against Socially Engineered Attacks The FBI’s Internet Crime Complaint Center (IC3) declared Business Email Compromise (BEC) the “3.1 billion dollar scam” in 2016, an amount which then grew in the span of one year into a “5 billion dollar scam.” Trend Micro […]
Linux Foundation Announces ACRN —Open Source Hypervisor for IoT Devices
The Linux Foundation announced a new project called ACRN (pronounced « acorn ») that will provide generic code for the creation of hypervisors for IoT devices. A hypervisor is computer code for creating and running virtual machines. Project ACRN aims to provide a generic structure for an IoT-specific hypervisor component. The Linux Foundation says it built […]
Prevent bot traffic from ruining Google Analytics
Distil Bot Discovery for Google Analytics is a free offering that will give website owners the ability to understand the impact of bots on their business. The service is provided by Distil Networks, a company specializing in bot detection and mitigation services. How to differentiate a human website visitor from […]
Experts discovered remotely exploitable buffer overflow vulnerability in MikroTik RouterOS
Security experts at Core Security have disclosed the details of a buffer overflow vulnerability that affects MikroTik RouterOS in versions prior to the latest 6.41.3. MikroTik is a Latvian vendor that produce routers used by many telco companies worldwide that run RouterOS Linux-based operating system. The vulnerability, tracked as CVE-2018-7445, could be exploited […]
Fears about the possibility of Russian cyber attacks in Britain
The British intelligence service has warned large power companies in the country of the possibility of Russian cyber attacks after the scandal with the poisoning of former Russian double spy Sergei Scrypal and his daughter Yulia, today reported British media citing a government source. “Communicate with all major infrastructure managers […]
GitHub utilisé par des acteurs malveillants pour héberger un mineur de moneros
Des acteurs malveillants s’appuient sur l’infrastructure de GitHub – une plateforme d’hébergement et de gestion de développement de logiciels – pour propager les malwares dont ils sont les auteurs. L’information est de la firme de sécurité Avast. « Les cybercriminels créent des forks – ce qui sous GitHub veut dire copier […]
Hackers tried to cause a blast at a Saudi petrochemical plant
A new cyber attack against a Saudi petrochemical plant made the headlines, hackers attempted to hit the infrastructure in August. Do you remember the powerful cyber attack that in 2012 hit computers at Saudi Aramco? A new cyber attack against a petrochemical plant in Saudi Arabia made the headlines, hackers attempted to hit the infrastructure […]
Hackers can elevate privileges by hacking into popular text editors
News of the day is that the Mossack Fonseca law firm would shut down operations due to the reputational damage caused by the Panama Papers security breach. The Panama Papers is a huge trove of strictly confidential documents from the Panamanian law firm Mossack Fonseca that was leaked online on April 3, 2016. […]