Darknet Card Fraud Increased By 50% in Germany in the First Quarter of 2018

In 2017, more than 80,000 cases of stolen card details were reported in Germany. The victims complained that they tried to make purchases only to find that they couldn’t access their funds. According to the The Local De, CNP is one of the most common…

Vulnerability Spotlight: Multiple Adobe Acrobat Reader DC Vulnerabilities

Discovered by Aleksandar Nikolic of Cisco Talos Overview Today, Talos is releasing details of a new vulnerabilities within Adobe Acrobat Reader DC. Adobe Acrobat Reader is the most popular… VISIT THE SOURCE ARTICLE Vulnerability Spotlight: Multiple Adobe Acrobat Reader DC Vulnerabilities

Vulnerability Spotlight: MySQL Multi-Master Manager Remote Command Injection Vulnerability

Overview Today, Talos is releasing details of a new vulnerability within MySQL Multi-Master Manager. This is used to perform monitoring, failover and management of MySQL master-master replication configurations. By… VISIT THE SOURCE ARTICLE Vulnerability Spotlight: MySQL Multi-Master Manager Remote Command Injection Vulnerability

Mexico central bank says possible cyber attack targets payment systems

… been the target of a cyber attack. It offered no details, however … Friday’s issue. In January, hackers attempted to rob the government-run … VISIT THE SOURCE ARTICLE Mexico central bank says possible cyber attack targets payment systems

North Korean hackers used servers in Thailand to carry out large scale global cyber attacks

… details on the global hacking campaign, dubbed Operation GhostSecret. … attacks and those used on Sony Pictures in 2014. But the attacks … say are state sponsored hackers from North Korea. As … since the Sony Pictures attack. Analyzing this certificate reveals … VISIT…

EPIC Sues ICE Over Technology Used to Conduct Warrantless Searches of Mobile Devices

EPIC has filed a Freedom of Information Act lawsuit against Immigration and Customs Enforcement for details of the agency’s use of mobile forensic technology to conduct warrantless searches of mobile devices. ICE has contracts with a company called Cellebrite for techniques to unlock, decrypt, and…

Vulnerability Spotlight: Adobe Acrobat Reader DC Document ID Remote Code Execution Vulnerability

Today, Talos is releasing details of a new vulnerability within Adobe Acrobat Reader DC. Adobe Acrobat Reader is the most popular and most feature-rich PDF reader. It has a big… VISIT THE SOURCE ARTICLE Vulnerability Spotlight: Adobe Acrobat Reader DC Document ID Remote Code Execution…

Welsh NHS systems failure down to technical glitch, not cyber attack | Computing

Doctors couldn’t access patient contact details or letters from other staff because of Welsh NHS IT failure Welsh NHS doctors were unable to access patient details  – including blood tests and x-rays – because of a failure in two data centres yesterday. Hospitals and GP…

Welsh NHS systems failure down to technical glitch, not cyber attack | Computing

Doctors couldn’t access patient contact details or letters from other staff because of Welsh NHS IT failure Welsh NHS doctors were unable to access patient details  – including blood tests and x-rays – because of a failure in two data centres yesterday. Hospitals and GP…