Hugo Saavedra

49 Flips | 4 Magazines | 1 Like | 11 Followers | @hugosaavedr3psq | Keep up with Hugo Saavedra on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Hugo Saavedra”

State Local Government Hit By Malware, Ransomware More Than SMBs

Localities and education networks suffered twice as many infections of the infamous CyptoWall ransomware than other sectors.<p>Small- and midsized …

Prolific Cybercrime Gang Favors Legit Login Credentials

FireEye researchers shed more light on infamous cybercriminals associated with RawPOS malware. and christen it 'FIN5.'<p>FIREEYE CYBER DEFENSE SUMMIT -- …

Apple confirma la existencia de «malware» en la Apple Store

Los cibercriminales han intentado derribar todas las puertas que se les pusieran de por medio. Y, pese a los filtros y barreras, consiguen acceder. …

Cyber crims up the ante with Google Play brainteaser malware

Android malware bundled in an intelligence-testing game has been published to the official Google Play Store, not once but twice, claiming hundreds …

Google Play

Planos y Decoración

DECORACIÓN EXTERIOR<p>Las piscinas son una excelente opción para tener en una casa más allá de su...<p>Cuando hablamos de piscinas hay muchísimas opciones …

None of us is safe: Major cybersecurity company hacked

Guess what: Even the best security companies can be hacked.<p>That's what Moscow-based Kaspersky Lab said Wednesday when it announced its systems had been attacked, most likely by hackers working on behalf of a country.<p>Kaspersky customer's data is safe, the company said. The sophisticated attack …

Memory scraping malware targets Oracle Micros point-of-sale customers

A new malware program designed to steal payment card details from point-of-sale (PoS) systems is targeting businesses using Oracle Micros …

Trend Micro

New Cryptowall 3.0 Ransomware Communicates over I2P Anonymous Network

We have seen a series of Ransomware tended to be simple with dogged determinations to extort money from victims. But with the exponential rise in the …

Park ‘N Fly, OneStopParking Confirm Breaches — Krebs on Security

Late last year, KrebsOnSecurity wrote that two huge swaths of credit card numbers put up for sale in the cybercrime underground had likely been …

Identity Theft

Banks: Card Breach at Some Chick-fil

Sources at several U.S. financial institutions say they have traced a pattern of credit card fraud back to accounts that all were used at different</b> …

Sony Pictures Scarier Hack — Hackers Leak Scripts, Celebrity Phone Numbers and Aliases

The massive hacking attack against Sony Pictures Entertainment has reached a more scarier phase following another huge leak of sensitive, …

Banks

Data gathered from several financial institutions and at least one underground cybercrime shop suggest that thieves have stolen credit and debit card …

FBI warns of 'destructive' malware in wake of Sony attack

BOSTON (Reuters) - The Federal Bureau of Investigation warned U.S. businesses that hackers have used malicious software to launch destructive attacks in the United States, following a devastating cyber attack last week at Sony Pictures Entertainment.<p>The word 'password' on a computer screen is …

Desde Al Jazeera a Clarín, piratas sirios hackean a varios diarios del mundo

El autodenominado Ejército Electrónico Sirio (SEA, por sus siglas en inglés) <b>atacó hoy diversas webs de diarios en todo el mundo, incluyendo la de</b> …

Skimmer Innovation

Banks in Europe are warning about the emergence of a rare, virtually invisible form of ATM skimmer involving a so-called “wiretapping” device that is …

Malware Detection Must Soon Recognize Evasive Behaviors

Criminals and advanced attackers have long fortified malware with features that help malicious code stay hidden from analysis. We’ve seen malware …

Regin: Nation-state ownage of GSM networks

Contents<p>Introduction, history<br>• Initial compromise and lateral movement<br>• The Regin platform<br>• Virtual File Systems (32/64-bit)<br>• Unusual modules and …

Cybersecurity

e-Cigarette infecta con malware el ordenador de un ejecutivo

Fumar no sólo perjudica la salud del fumador y del que le rodea, también puede perjudicar a tu ordenador. Es el caso de un ejecutivo cuyo ordenador …

Secret Malware in European Union Attack Linked to U.S. and British Intelligence

Complex malware known as Regin is the suspected technology behind sophisticated cyberattacks conducted by U.S. and British intelligence agencies on …

DoubleDirect | Full-Duplex ICMP Redirect Attacks in the Wild

DoubleDirect – Zimperium Discovers Full-Duplex ICMP Redirect Attacks in the Wild<p>Z Team<br>• Threat Research<br>• Nov 20 2014<p>By: <b>Esteban Pellegrino</b>, <b>Zuk Avraham</b>, …

Regin: Top-tier espionage tool enables stealthy surveillance

An advanced spying tool, Regin displays a degree of technical competence rarely seen and has been used in spying operations against governments, …

Surveillance