You Are Here: Home » Articles posted by Liviu Arsene

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android malware is not unusual; we’ve even seen it pop up in Google’s Marketplace app on several occasions. Increasing in both sophistication and stealthiest, Android malware has mostly been a nuisance on third-party marketplaces, such as in China, where it continues to thrive. Why third party marketplaces? As Google’s Bouncer does a pretty good job at identifying malicious apps – for the most part – Androi...

North Korea Possibly Behind Alleged South Korea Defense Contractor Hack

South Korean defense contractor Hanjin Heavy Industries & Construction Co. has been allegedly hacked by North Korea, according to the local military counter-intelligence service. The naval warship builder allegedly suffered a security breach on April 20, although no details regarding its severity or consequences have been offered to the press. South Korean officials have started investigating the incide...

Alleged Syrian Electronic Army Hacker Extradited to the US

Alleged hacker Peter Romar, 36, has been extradited to the US following evidence of his involvement with the hacker group known as the Syrian Electronic Army (SEA). Expected to appear in the Eastern District of Virginia court on Tuesday, the German national is believed to have also helped extort money from US companies. Working with Firas Dardar, a member of the SEA, Romar would receive extortion payment fr...

Researcher Arrested for Hacking into Lee County Elections Website

Political consultant and cybersecurity company owner David Levin has been jailed on accusations of hacking into the state elections website on Jan. 4 and Jan. 31. The Florida Department of Law Enforcement accused Lee, who turned himself in just hours after an arrest warrant was issued in his name, of three counts of third-degree-felony property crimes. After six hours in Lee County Jail, Lee paid a $15,000...

Instagram Vulnerability Lands $10,000 Bounty for 10-Year-Old

Facebook-owned Instagram was deemed vulnerable by 10-year-old Jani from Helsinki, who revealed that he could delete comments and descriptions on any Instagram account. The vulnerability enabled Jani to insert malicious code into the comment section of Instagram, effectively allowing him to delete anything – even profiles – with no authorization from the targeted account. “I tested if Instagram can withstand...

Details on 87 Million Mexican Voters Available Online

The addresses of 87 million Mexican voters were recently accessible online to anyone with an internet connection -- all without authentication or protection by security mechanisms. Texan whistleblower Chris Vickery informed Mexican authorities of his findings, stating that the information could be used by criminals. While the information was available via AWS (Amazon Web Services), the company’s website doe...

57 Months in Prison for US State Department Sextortionist

US District Judge Eleanor Ross sentenced former US State Department official Michael Ford to 57 months in prison after he pleaded guilty to nine counts of cyberstalking, one of wire fraud, and seven of hacking and extortion. The 36 year-old admitted to widespread sextortion and cyberhacking between January 2013 and May 2015, succeeding in hacking 450 email accounts and 200 social media profiles. He operated...

Chinese Businessman Jailed for Stealing U.S. Military Secrets

Chinese businessman Su Bin admitted to stealing U.S. military secrets and exporting them to the communist nation between 2008 and 2014, with the help of two unnamed hackers. The stolen information was mostly about the military F-22s, F-35 and Boeing's C-17 cargo aircraft. It was apparently translated into Chinese by the 50-year-old businessman and delivered to his contacts. Arrested in July 2014 in Canada a...

Cybercriminals used in State-Sponsored Attacks, says U.S. Cyber Command

Hackers are believed to be working with foreign governments to take down U.S. infrastructure or break into U.S. computer systems, according to a Cyber Command statement to the members of Congress. Adm. Michael S. Rogers, head of U.S. Cyber command, believes criminals groups are being used to conduct cybercriminal activities against the United States on behalf of foreign governments, allowing state-sponsors...

Threat Intelligence Sharing Act Kick-Started by US Homeland Security

Following the US Cybersecurity Information Sharing Act of 2015 passed by Congress and signed by President Obama, the Department of Homeland Security started sharing threat intelligence with businesses. While companies can voluntarily adhere to the program and start sharing threat intelligence with the DHS, the program counts on the continuous cooperation of as many companies as possible. So far, six organiz...

© 2012 Powered By Bitdefender

Scroll to top