Study: Over 60% of web services, App APIs have high risk vulnerability

For Infosecurity Europe 2016, High-Tech Bridge has released a comprehensive overview of trends across all major fields of web security. The trends include all types of security and privacy issues, from web application vulnerabilities to HTTPS traffic encryption and PCI DSS compliance. Over 1,000 people per day use High-Tech Bridge’s free web security services: SSL/TLS …

Cyberattacks expected to rise as China-based state-linked hackers target organizations

Cyberattacks in Hong Kong are expected to rise, according to security experts who have identified at least seven state-linked hacker groups in mainland China that have been targeting organisations in the city since 2014.   Bryce Boland, the chief technology officer for Asia-Pacific at cybersecurity company FireEye, said on Thursday that cyberattacks by the hacker …

Crooks are abusing Google Search Console to hide in compromised websites

Source: securityaffairs.co Experts at Sucuri revealed that cybercriminals are abusing Google Search Console to hide their presence in compromised websites, administrators are advised! Security experts at Sucuri firm have discovered cyber criminals are increasingly abusing legitimate webmaster tools (Google Search Console) for black hat SEO and hide their presence on compromised websites. The operation for …

NSA, GCHQ reportedly reverse engineered anti-virus security companies since 2008

Edward Snowden, the former NSA contractor and whistleblower, has leaked documents that claim the US National Security Agency (NSA) and UK Government Communications Headquarters (GCHQ) have actively reverse engineered security and anti-virus software to obtain intelligence, according to a report by The Intercept. The documents obtained reportedly highlight the Russian software security firm, Kaspersky Lab, …

Filipino hackers wage cyberwar on Chinese Web sites

Attention this week has centered on the covert cyberwar taking place between the United States and China. Chinese authorities pointed to the supposed hypocrisy of Washington leveling cyberspying charges against China, even while the United States maintains its own vast network of clandestine surveillance and monitoring. There are myriad other stealth attacks launched from the …

Zimbabwe to snoop on citizens’ mobile communications

Zimbabwe’s government has enacted a controversial law that could enable it to spy on any citizen’s cellphone call records as well as text messages. The government gazetted ‘Statutory Instrument 142 of 2013 on Postal and Telecommunications (Subscriber Registration) Regulations, 2013’ on Friday as the country’s new communications minister Webster Shamu – a loyalist of President …

Correlation between country governance regimes and the reputation of their Internet (IP) address allocations

We recently analyzed the reputation of a country’s Internet (IPv4) addresses by examining the number of blacklisted IPv4 addresses that geolocate to a given country. We compared this indicator with two qualitative measures of each country’s governance. We hypothesized that countries with more transparent, democratic govermental institutions would harbor a smaller fraction of misbehaving (blacklisted) …