Data breach in casino's point of sale system
Possible data security breach in the FireKeepers Casino Hotel’s casino point of sale system, reports Battle Creek Enquirer. The casino got to know about the security breach, after they received ‘a...
View ArticleCisco fixes remote code flaw in its UCS Central software
Cisco System Inc, an American multinational corporation, has released an advisory to address remote code execution vulnerability in its Unified Computing System (UCS) Central software, a networking...
View ArticleUS beauty products chain Sally Beauty investigates a possible data breach
US-based cosmetics and beauty retailer ‘Sally Beauty Holdings Inc.’ confirmed a possible data breach for the second time in a year, as it investigates reports of “unusual activity involving payment...
View ArticleTwo men, who developed Photobucket hacking software, charged with conspiracy...
Two men were arrested on April 8 in the charge of conspiracy and fraud after breaching computer services of Colorado-based Photobucket, a company that runs an image and video hosting website, according...
View Article'Rombertik' malware which destroys the system if detected
Researchers have discovered a new malware ‘Rombertik’ which destroys the system if it realizes that it is being analyzed. "Security researchers are constantly looking for ways to better detect and...
View ArticleOne click scammers targeting people in Hong Kong
People running one click scams on the internet have seem to taken it one step further by creating new malware in Chinese.Recently, one click scammers have begun targeting people in Hong Kong by using...
View ArticleCeline Dion's website becomes unusual spam launchpad, astonishes fans
Singer Celine Dion recently had her website showing something unusual. The Canadian vocalist’s website viewed a hockey related spam, surprising her fans all over the world.(pc- malwarebytes.org)Partial...
View ArticleCSPF comes up with modsecurity rules to protect servers from hacker
Cyber Security and Privacy Foundation (CSPF), a non-profit organisation which provides solution to tackle cyber security and privacy issues, has developed a set of rules to protect servers from...
View ArticlePHP Object Injection Vulnerability in Bomgar Remote Support Portal
A security vulnerability has been found in the Bomgar Remote Support Portal version 14.3.1 and earlier versions, which is the part of Bomgar's appliance-based remote support software, deserialize...
View ArticleHow the Mackeeper failed to secure Mac
Mackeeper, the program designed to keep Mac computers secure suffers from a critical remote code execution vulnerability. This flaw lies in the lack of input validation during the handling of custom...
View ArticleJamie Oliver's website still facing malware issues
Visitors to British chef Jamie Oliver's website have became the latest victims to a malware attack. The website, www.JamieOliver.com has been infecting users who search the website for recipes, reports...
View ArticleUpgrade your SOHO routers firmware to the latest version, to protect from DDos
A recent study has uncovered that a huge number of Small Office / Home Office (SOHO) routers, who neglect basic security practices, were recently targeted by attackers. The study conducted by Incapsula...
View ArticleBitTorrent releases Bleep for iOS, introduces new feature 'Whisper'
In the era of communication, instant messaging apps are what making news every day. A new entrant in this world of apps is “Bleep”. It is a fun and easy to use mobile messaging app for iOS released by...
View ArticleCisco releases software updates to address serious flaws in TelePresence...
Cisco has released software updates to address several vulnerabilities that have been identified in its TelePresence products, which can be exploited by hackers to compromise a vulnerable system.It has...
View ArticleVenom Vulnerability allows hackers to escape from VM and hack Host Machine
CrowdStrike’s senior security researcher Jason Geffner disclosed the vulnerability in the virtual Floppy Drive Code used by many computer virtualization platforms. Vulnerability VENOM, CVE-2015-3456,...
View ArticleSecurity Explorations reveals several vulnerabilities in Google App Engine
Security Explorations, a Poland-based security firm, on May 15 disclosed technical details and Proof of Concept (PoC) codes for unconfirmed and unpatched vulnerabilities presence in Google App Engine...
View ArticleDetails of 400,000 users leaked as mSpy is hacked
The mobile spying software service, mSpy has been allegedly hacked and personal data of about 400,000 customers released in the Deep Web. mSpy, a software as a service product claims to help about 2...
View ArticleHackers try to attack German parliament Bundestag
The officials of Bundestag, lower house of German parliament, on May 15 confirmed that its IT system has been attacked by hackers. Ernst Hebeker, spokesperson at the Bundestag, said in Berlin, that...
View ArticleGenisis Secure USB Drive - Security Bugs
Cyber Security and Privacy Foundation (CSPF) has recommended people not to Genisis securedrive - so-called encrypted UBS device which is supposed to be used for storing sensitive data, after it tested...
View ArticleFBI investigating e-billboard hacking
The FBI has been called into action after an electronic billboard was hacked on Peachtree road in Atlanta, according to local report.While driving down the road on Saturday, commuters saw the image of...
View Article