Cyber Attacks

What to expect in 2013

According to Sophos CTO Gerhard Eschelbeck, modern malware has become extremely effective at attacking new platforms and that explains why we are experiencing a rapid growth of malware attacking mobile devices. While malware for Android was just a lab example…

Attackers Tools for Security Pros

Security professionals are tasked with the responsibility of securing systems and networks, and finding weaknesses that may be exploited by cyber criminals. Furthermore, security pros need to be aware of the capabilities of hacking tools and techniques used by attackers.…

September Global DDoS

Watch September’s DDoS attacks as detected and recorded by Team Cymru, highlighting the top 7 most attacked countries and revealing a few surprises along the way. This is a video series where in the second movie, Team Cymru focuses on…

Google Play services and OAuth 2.0

Google will make OAuth 2.0 authorization available to Android apps as to allow apps leverage the built-in security features of the OAuth 2.0 protocol. OAuth 2.0 protocol can help in mitigating attacks and security incidents. Google Play services has just…

New IE 7 and IE 8 0-day Vulnerability

Following the discovery of the Java SE 7 0day exploit, a French security researcher by the name of Eric Romang took to task an intensive research related to infected servers used by the alleged Nitro gang. During his research, Eric…