Eskenzi PR ad banner Eskenzi PR ad banner

Top 10 Stories

An increase in the spread of malware through mobile storage devices, such as USBs, CDs and DVDs, was recorded in Greece during the first half of 2014, according to data released by Kaspersky Security Network. More than 2,615,000 cases of malware were detected on computers that use Kaspersky Security Network. The company stressed that during the same period in 2013, almost 1,901,000 cases were recorded, putting Greece in 117th place on a global level.

Read more

According to a survey conducted by Kaspersky Lab and B2B International, 62% of users worldwide fear financial fraud on the Internet, 49% of users felt vulnerable while shopping online or making online transactions, and 42% of users would utilize online payment systems more often if they felt they were protected from cyber fraud. In addition, 37% of users report terminating a financial operation in the middle of the process because they were unsure about the...

Read more

Security experts have warned site owners that want to add social media share buttons to their web pages that hackers are hiding FlashPack malware in legitimate looking website add-ons. FlashPack is an exploit kit which delivers various Flash exploits including one which targets a Flash vulnerability (CVE-2014-0497) which was patched back in February. It’ll also download the Carberp information-stealing trojan to open a backdoor on the victim’s machine, according to Trend Micro fraud researcher, Joseph...

Read more

At Black Hat and Def Con earlier this month, the penetration testing tool makers at Pwnie Express unveiled two new products aimed at extending the company's reach into the world of continuous enterprise security auditing. One, the Pwn Pro, is essentially a souped-up version of Pwnie Express' Pwn Plug line of devices; the other, Pwn Pulse, is a cloud-based software-as-a-service product that provides central control of a fleet of Pwn Pro “sensors.” Combined, the two...

Read more

Researchers demonstrated a new side channel attack which allow them to steal encryption keys by simply touching a laptop. Yesterday I published a post on an interesting research conducted by a the team of experts which demonstrated an attack exploits “a newly discovered public side channel” allowing threat actor to access the shared memory statistics of an app’s process, today we will discuss of a new potential method for extracting sensitive data from PCs simply...

Read more
Page 460 of 630 1 459 460 461 630