Monthly Archives: May 2015

Tracking wearable devices could be very easy via Bluetooth Low Energy

Researchers at Context Information Security have demonstrated that it is very easy to monitor IoT devices that implement the Bluetooth Low Energy protocol. Internet of Things are enlarging our surface of […]

Posted in Cyber Security News | Comments Off on Tracking wearable devices could be very easy via Bluetooth Low Energy

The Phantom Menace, who targeted the oil tankers?

Panda Security firm released a report regarding a hacking campaign dubbed “Operation Oil Tanker: The Phantom Menace” that targeted oil tankers. Security researchers at Panda Security have released a report on […]

Posted in Cyber Security News | Comments Off on The Phantom Menace, who targeted the oil tankers?

Yemen Cyber Army hacked principal Saudi Gov networks

The group of hackers known as Yemen Cyber Army has hacked the computer systems at Saudi Arabia, they control also Interior Ministry and Defense Ministry. The group of hackers known […]

Posted in Cyber Security News | Comments Off on Yemen Cyber Army hacked principal Saudi Gov networks

Android Factory reset fails to wipe sensitive user data, million devices at risk

Two security researchers demonstrated that the Android Factory Reset process fails to wipe private data from Android mobile devices. Researchers at Cambridge University, Laurent Simon and Ross Anderson, revealed that half a […]

Posted in Cyber Security News | Comments Off on Android Factory reset fails to wipe sensitive user data, million devices at risk

CareFirst data breach affects about 1.1M people

CareFirst BlueCross BlueShield fall victim of a major data breach, personal information belonging more than one million individuals could have been exposed. Health insurer CareFirst BlueCross BlueShield is notifying more […]

Posted in Cyber Security News | Comments Off on CareFirst data breach affects about 1.1M people

Unknown Hackers hit systems at Bundestag

The Bundestag has become the target of a significant cyber attack, hackers tried to compromise the internal network of the German Parliament. The German parliament Bundestag has officially confirmed media […]

Posted in Cyber Security News | Comments Off on Unknown Hackers hit systems at Bundestag

Are Artificial Pancreas vulnerable to cyber attacks?

A team of researchers explains that million of lives potentially depends on the resilience to cyber attacks of a new generation of “artificial pancreas.” Medical devices are open to cyber attacks, […]

Posted in Cyber Security News | Comments Off on Are Artificial Pancreas vulnerable to cyber attacks?

ISIS – Cyber Caliphate hackers are threatening Electronic War

Pro-Isis Hackers belonging to Cyber Caliphate hacking team threaten ‘Electronic War’ on US and Europe. Which are ISIS cyber capabilities? Is the Islamic State group able to engage a cyber war against Western […]

Posted in Cyber Security News | Comments Off on ISIS – Cyber Caliphate hackers are threatening Electronic War

Is your smartphone being tracked? We asked an expert

In the movies, people on the run are often hunted down because of their cell phones. There are countless scenes where expensive smartphones are smashed to bits, or dropped in […]

Posted in Cyber Security News | Comments Off on Is your smartphone being tracked? We asked an expert

Chinese hackers hit Penn State University, 18K people impacted

The Penn State suffered a high sophisticated cyber attack that that seems to be originated from China and that exposed data belonging to 18K people. The Pennsylvania State University’s College […]

Posted in Cyber Security News | Comments Off on Chinese hackers hit Penn State University, 18K people impacted

VENOM vulnerability opens millions of virtual machines to attack

The VENOM vulnerability A security vulnerability recently patched is scaring the IT industry, its name is VENOM and it is coded as CVE-2015-3456. The dreaded vulnerability was first discovered by Jason […]

Posted in Cyber Security News | Comments Off on VENOM vulnerability opens millions of virtual machines to attack

Google Hangouts doesn’t use end-to-end encryption, law enforcement can access it

Google Hangouts doesn’t implement end-to-end encryption, when users message or talk with someone on Hangouts is exposing to Government Wiretapping. Edward Snowden has revealed how the US intelligence spy on […]

Posted in Cyber Security News | Comments Off on Google Hangouts doesn’t use end-to-end encryption, law enforcement can access it

Law enforcement warns of Nepal Earthquake Scams

FBI and security researchers have uncovered fraudulent activity pertaining to relief efforts associated with the tragic Nepal earthquake. Cyber criminals have no scruples, they are always ready to exploit any […]

Posted in Cyber Security News | Comments Off on Law enforcement warns of Nepal Earthquake Scams

US SOCOM and The Special Forces to Scrutinize Social media

US SOCOM admitted that Counter-Terrorism Special Forces scrutinize FaceBook and other social media to handle potentially useful information. Exactly two years ago I wrote about the use of social media in the Military. […]

Posted in Cyber Security News | Comments Off on US SOCOM and The Special Forces to Scrutinize Social media

Flawed Open Smart Grid Protocol is a risk for Smart Grid

More than four million smart meters and similar devices worldwide are open to cyber attacks due to the security issued in the Open Smart Grid Protocol. The Open Smart Grid […]

Posted in Cyber Security News | Comments Off on Flawed Open Smart Grid Protocol is a risk for Smart Grid

Australian 19 year-old who hacked Microsoft and US Army is fugitive

An Australian teenager who hacked Microsoft, Valve and the US Army has left the Australia. The Interpol is searching for him in Europe. An Australian teenager, who had allegedly hacked […]

Posted in Cyber Security News | Comments Off on Australian 19 year-old who hacked Microsoft and US Army is fugitive

Password for systems at a London rail station revealed during a TV documentary

The passwords for the signal system of the control room at the Waterloo rail station in London were disclosed during a TV documentary. We cannot think of lock down the […]

Posted in Cyber Security News | Comments Off on Password for systems at a London rail station revealed during a TV documentary

Trustwave discovered the first political malvertising campaign

Experts at Trustwave observed a group of cyber criminals helping spread pro-Russia propaganda by inflating video views with a malvertising campaign. Security experts at Trustwave have discovered a botnet, originally designed […]

Posted in Cyber Security News | Comments Off on Trustwave discovered the first political malvertising campaign

Thousands Linux and FreeBSD servers infected with Mumblehard spamming malware

The sophisticated Mumblehard spamming malware infects thousands of Linux and FreeBSD servers going under the radar for at least five years. In the last seven months, several thousand Linux and FreeBSD […]

Posted in Cyber Security News | Comments Off on Thousands Linux and FreeBSD servers infected with Mumblehard spamming malware

How to exploit flaws in InFocus IN3128HD Projector to hack the host network

The firmware running on the InFocus IN3128HD Projector is affected by an authentication bypass flaw which allows the hack of the host network. Another smart object was found vulnerable by security experts, it is […]

Posted in Cyber Security News | Comments Off on How to exploit flaws in InFocus IN3128HD Projector to hack the host network

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X