Yearly Archives: 2015
Meet the botnet made up of 12000 Italian devices
Earlier February, experts at VoidSec where performing ordinary maintenance on their personal website when noticed something of strange in the logs. It was a “strange” recurring pattern, revealing a brute […]
European credit card payment terminals are plagued with serious flaws
Two German security experts have exposed a number of serious flaws in credit card payment systems that put users at risk. The duo of German security experts, Karsten Nohl and Fabian […]
Who planted the Juniper ScreenOS Authentication Backdoor?
Who planted the Authentication Backdoor in the Juniper ScreenOS? Security experts are making their speculation, but interesting revelations are coming out. While the FBI is investigating the case searching for responsible for […]
Researcher discovered database containing data of 3.3 million Hello Kitty fans
The researcher Chris Vickery has discovered a database leak that exposed 3.3 million accounts belonging to Hello Kitty fans. The database of the official online community for Hello Kitty and […]
Hillary Clinton calls tech companies to create a Manhattan Project for Encryption
At tonight’s Democratic national debate Hillary Clinton calls tech companies to work on a new Manhattan Project for Encryption. At tonight’s Democratic national debate Hillary Clinton calls tech companies cooperate […]
GCHQ Gaffer database goes open source
The British intelligence agency GCHQ has released the Gaffer database as an open source project. Gaffer is sort of database written in Java that makes it “easy to store large-scale graphs in […]
Twitter warns victims of state-sponsored attacks
Twitter has notified some of its users that they may have been targeted in an attack by state-sponsored hackers. Twitter is warning users of state-sponsored cyber attacks, a small number of users, including […]
European Space Agency domains hacked by Anonymous
The collective Anonymous has compromised the subdomains of the European Space Agency website and leaked personal information of thousands of subscribers and officials. The hacking collective Anonymous seems to be very active […]
The French Gov will not block Tor and Free Wi-Fi
According to the French Prime Minister Valls the Government will not ban Public Wi-Fi or the Tor Network. Last week, documents leaked to Le Monde suggested that the French Government was planning to adopt drastic […]
EU regulation to impose rules on firms to improve cybersecurity
EU member states and lawmakers have prepared a first draft of the EU regulation in cyber security that will force companies to improve security and report security breaches and cyber […]
Is he Satoshi Nakamoto? Australian Police raid home of the alleged Bitcoin father
While media announced to have found the real identity of the Bitcoin creator Satoshi Nakamoto, Australian police raided his home in Sidney. A few hours after the media indicated the […]
BackStab Malware steals iOS and BlackBerry Backups
Security experts at Palo Alto Networks have uncovered a new strain of malware dubbed BackStab that steals local mobile data backups. Security experts at Palo Alto Networks have uncovered a […]
UK ANPR systems are one of the ‘world’s biggest surveillance systems’
The automatic number plate recognition systems (ANPR) used by the UK police are one of the largest surveillance systems in the world. When dealing surveillance systems the majority of people […]
New malware targeting Linux users
Experts at Russian anti-virus firm Dr.Web discovered Rekoobe, a new malware that is targeting Linux systems. Rekoobe is a new malware that is targeting Linux systems, the discovery was made by experts at Russian […]
Black marketplace – 50c buys login for stolen media accounts
It is Christmas time and sellers are offering a wide number of products and services in the Black marketplace. 50c buys login for stolen media accounts. Cyber criminals are offering for […]
Russia deploys jamming systems in Syria as tensions rise
Russia will deploy jamming systems in Syria to protect its air forces and prevent attacks against its aircraft. The Russian army in Syria is planning to launch electronic warfare in the country […]
Italian intelligence plans to monitor communications through the Playstation
Italian intelligence is planning to invest in solutions that could allow its counter-terrorism agents to monitor Sony’s PlayStation Network. The Italian intelligence is planning to invest in solutions that could allow […]
The Hello Barbie doll, lights and shadows
Mattel’s Hello Barbie has finally arrived in stores, but security experts have raised questions about security and privacy issues related to the technological toy. Are you thinking of buying a […]
Trident nuclear weapons system could be vulnerable to cyber attacks
The former British defence secretary Des Browne is warning that Trident nuclear weapons system could be vulnerable to cyber-attack. According to the Guardian, the former British defence secretary Des Browne called […]
Dell puts users at risk with dangerous eDellRoot root certificate
Dell is in the headlines for shipping PCs with a pre-installed trusted root certificate dubbed eDellRoot that opens users to a number of cyber attacks. Dell is in the headlines […]
TrueCrypt is safer than previous examinations suggest
A new security audit the TrueCrypt software confirmed that even if it is plagued by some vulnerabilities, the application is effective when it comes to protecting data. TrueCrypt, secure or […]
Dozens of secret and Top secret databases vulnerable to hack
Evaluation of DHS Information Security Program for Fiscal Year 2015 revealed the existence of dozens of top-secret unpatched databases. The story I’m about to tell you is staggering, the US Department of Homeland […]
EU plans to ban Bitcoin to curb terrorism funding
According to a draft document seen by the Reuters the EU plans to ban bitcoin and any form of anonymous payment online to curb terrorism funding. European Union countries are […]
Windows Bitlocker disk encryption could be easily bypassed
Microsoft recently fixed the a vulnerability in the Bitlocker disk encryption feature that could be exploited to easily bypassed it is a few seconds. A disk encryption tool is a very important […]
Three men charged for the attack on the JPMorgan Chase
U.S. Authorities have charged other three men in huge cyber fraud targeting JPMorgan, and at least another nine financial institutions. The US authorities have charged three individuals over the hack […]
GCHQ and NCA hunting criminals in the dark web
The GCHQ and NCA join forces to fight online criminals in the Dark Web and formed a new unit called the Joint Operations Cell (JOC). The dark web is a privileged environment […]
200,000 Comcast login credentials available on the Dark Web
During the weekend, nearly 590,000 Comcast email addresses and passwords were offered for sale on a BlackMarket in the dark web. It is now the turn of Comcast, over the […]
British NCA revealed to have hacking abilities, aka equipment interference
Documents published by the UK Government reveal that the UK’s National Crime Agency has the hacking capabilities, so called equipment interference. We have debated for a long time about hacking […]
OmniRat RAT is currently being used by criminals in the wild
Researchers at Avast have published an analysis of OmniRAT, a multi-platform remote administration tool (RAT) that has been used by criminals in the wild. Researchers at Avast have conducted a […]
A Fourth Teenager was arrested over TalkTalk data breach
British police announced Tuesday they had arrested a fourth teenager in connection with a data breach suffered by the Internet Service Provider TalkTalk. The investigation of the TalkTalk data breach is still […]