Yearly Archives: 2015

Meet the botnet made up of 12000 Italian devices

Earlier February, experts at VoidSec where performing ordinary maintenance on their personal website when noticed something of strange in the logs. It was a “strange” recurring pattern, revealing a brute […]

Posted in Cyber Security News | Comments Off on Meet the botnet made up of 12000 Italian devices

European credit card payment terminals are plagued with serious flaws

Two German security experts have exposed a number of serious flaws in credit card payment systems that put users at risk. The duo of German security experts, Karsten Nohl  and Fabian […]

Posted in Cyber Security News | Comments Off on European credit card payment terminals are plagued with serious flaws

Who planted the Juniper ScreenOS Authentication Backdoor?

Who planted the Authentication Backdoor in the Juniper ScreenOS? Security experts are making their speculation, but interesting revelations are coming out. While the FBI is investigating the case searching for responsible for […]

Posted in Cyber Security News | Comments Off on Who planted the Juniper ScreenOS Authentication Backdoor?

Researcher discovered database containing data of 3.3 million Hello Kitty fans

The researcher Chris Vickery has discovered a database leak that exposed 3.3 million accounts belonging to Hello Kitty fans. The database of the official online community for Hello Kitty and […]

Posted in Cyber Security News | Comments Off on Researcher discovered database containing data of 3.3 million Hello Kitty fans

Hillary Clinton calls tech companies to create a Manhattan Project for Encryption

At tonight’s Democratic national debate Hillary Clinton calls tech companies to work on a new Manhattan Project for Encryption. At tonight’s Democratic national debate Hillary Clinton calls tech companies cooperate […]

Posted in Cyber Security News | Comments Off on Hillary Clinton calls tech companies to create a Manhattan Project for Encryption

GCHQ Gaffer database goes open source

The British intelligence agency GCHQ has released the Gaffer database as an open source project. Gaffer is sort of database written in Java that makes it “easy to store large-scale graphs in […]

Posted in Cyber Security News | Comments Off on GCHQ Gaffer database goes open source

Twitter warns victims of state-sponsored attacks

Twitter has notified some of its users that they may have been targeted in an attack by state-sponsored hackers. Twitter is warning users of state-sponsored cyber attacks, a small number of users, including […]

Posted in Cyber Security News | Comments Off on Twitter warns victims of state-sponsored attacks

European Space Agency domains hacked by Anonymous

The collective Anonymous has compromised the subdomains of the European Space Agency website and leaked personal information of thousands of subscribers and officials. The hacking collective Anonymous seems to be very active […]

Posted in Cyber Security News | Comments Off on European Space Agency domains hacked by Anonymous

The French Gov will not block Tor and Free Wi-Fi

According to the French Prime Minister Valls the Government will not ban Public Wi-Fi or the Tor Network. Last week, documents leaked to Le Monde suggested that the French Government was planning to adopt drastic […]

Posted in Cyber Security News | Comments Off on The French Gov will not block Tor and Free Wi-Fi

EU regulation to impose rules on firms to improve cybersecurity

EU member states and lawmakers have prepared a first draft of the EU regulation in cyber security that will force companies to improve security and report security breaches and cyber […]

Posted in Cyber Security News | Comments Off on EU regulation to impose rules on firms to improve cybersecurity

Is he Satoshi Nakamoto? Australian Police raid home of the alleged Bitcoin father

While media announced to have found the real identity of the Bitcoin creator Satoshi Nakamoto, Australian police raided his home in Sidney. A few hours after the media indicated the […]

Posted in Cyber Security News | Comments Off on Is he Satoshi Nakamoto? Australian Police raid home of the alleged Bitcoin father

BackStab Malware steals iOS and BlackBerry Backups

Security experts at Palo Alto Networks have uncovered a new strain of malware dubbed BackStab that steals local mobile data backups. Security experts at Palo Alto Networks have uncovered a […]

Posted in Cyber Security News | Comments Off on BackStab Malware steals iOS and BlackBerry Backups

UK ANPR systems are one of the ‘world’s biggest surveillance systems’

The automatic number plate recognition systems (ANPR) used by the UK police are one of the largest surveillance systems in the world. When dealing surveillance systems the majority of people […]

Posted in Cyber Security News | Comments Off on UK ANPR systems are one of the ‘world’s biggest surveillance systems’

New malware targeting Linux users

Experts at Russian anti-virus firm Dr.Web discovered Rekoobe, a new malware that is targeting Linux systems. Rekoobe is a new malware that is targeting Linux systems, the discovery was made by experts at Russian […]

Posted in Cyber Security News | Comments Off on New malware targeting Linux users

Black marketplace – 50c buys login for stolen media accounts

It is Christmas time and sellers are offering a wide number of products and services in the Black marketplace. 50c buys login for stolen media accounts. Cyber criminals are offering for […]

Posted in Cyber Security News | Comments Off on Black marketplace – 50c buys login for stolen media accounts

Russia deploys jamming systems in Syria as tensions rise

Russia will deploy jamming systems in Syria to protect its air forces and prevent attacks against its aircraft. The Russian army in Syria is planning to launch electronic warfare in the country […]

Posted in Cyber Security News | Comments Off on Russia deploys jamming systems in Syria as tensions rise

Italian intelligence plans to monitor communications through the Playstation

Italian intelligence is planning to invest in solutions that could allow its counter-terrorism agents to monitor Sony’s PlayStation Network. The Italian intelligence is planning to invest in solutions that could allow […]

Posted in Cyber Security News | Comments Off on Italian intelligence plans to monitor communications through the Playstation

The Hello Barbie doll, lights and shadows

Mattel’s Hello Barbie has finally arrived in stores, but security experts have raised questions about security and privacy issues related to the technological toy. Are you thinking of buying a […]

Posted in Cyber Security News | Comments Off on The Hello Barbie doll, lights and shadows

Trident nuclear weapons system could be vulnerable to cyber attacks

The former British defence secretary Des Browne is warning that Trident nuclear weapons system could be vulnerable to cyber-attack. According to the Guardian, the former British defence secretary Des Browne called […]

Posted in Cyber Security News | Comments Off on Trident nuclear weapons system could be vulnerable to cyber attacks

Dell puts users at risk with dangerous eDellRoot root certificate

Dell is in the headlines for shipping PCs with a pre-installed trusted root certificate dubbed eDellRoot that opens users to a number of cyber attacks. Dell is in the headlines […]

Posted in Cyber Security News | Comments Off on Dell puts users at risk with dangerous eDellRoot root certificate

TrueCrypt is safer than previous examinations suggest

A new security audit the TrueCrypt software confirmed that even if it is plagued by some vulnerabilities, the application is effective when it comes to protecting data. TrueCrypt, secure or […]

Posted in Cyber Security News | Comments Off on TrueCrypt is safer than previous examinations suggest

Dozens of secret and Top secret databases vulnerable to hack

Evaluation of DHS Information Security Program for Fiscal Year 2015 revealed the existence of dozens of top-secret unpatched databases. The story I’m about to tell you is staggering, the US Department of Homeland […]

Posted in Cyber Security News | Comments Off on Dozens of secret and Top secret databases vulnerable to hack

EU plans to ban Bitcoin to curb terrorism funding

According to a draft document seen by the Reuters the EU plans to ban bitcoin and any form of anonymous payment online to curb terrorism funding. European Union countries are […]

Posted in Cyber Security News | Comments Off on EU plans to ban Bitcoin to curb terrorism funding

Windows Bitlocker disk encryption could be easily bypassed

Microsoft recently fixed the a vulnerability in the Bitlocker disk encryption feature that could be exploited to easily bypassed it is a few seconds. A disk encryption tool is a very important […]

Posted in Cyber Security News | Comments Off on Windows Bitlocker disk encryption could be easily bypassed

Three men charged for the attack on the JPMorgan Chase

U.S. Authorities have charged other three men in huge cyber fraud targeting JPMorgan, and at least another nine financial institutions. The US authorities have charged three individuals over the hack […]

Posted in Cyber Security News | Comments Off on Three men charged for the attack on the JPMorgan Chase

GCHQ and NCA hunting criminals in the dark web

The GCHQ and NCA join forces to fight online criminals in the Dark Web and formed a new unit called the Joint Operations Cell (JOC). The dark web is a privileged environment […]

Posted in Cyber Security News | Comments Off on GCHQ and NCA hunting criminals in the dark web

200,000 Comcast login credentials available on the Dark Web

During the weekend, nearly 590,000 Comcast email addresses and passwords were offered for sale on a BlackMarket in the dark web. It is now the turn of Comcast, over the […]

Posted in Cyber Security News | Comments Off on 200,000 Comcast login credentials available on the Dark Web

British NCA revealed to have hacking abilities, aka equipment interference

Documents published by the UK Government reveal that the UK’s National Crime Agency has the hacking capabilities, so called equipment interference. We have debated for a long time about hacking […]

Posted in Cyber Security News | Comments Off on British NCA revealed to have hacking abilities, aka equipment interference

OmniRat RAT is currently being used by criminals in the wild

Researchers at Avast have published an analysis of OmniRAT, a multi-platform remote administration tool (RAT) that has been used by criminals in the wild. Researchers at Avast have conducted a […]

Posted in Cyber Security News | Comments Off on OmniRat RAT is currently being used by criminals in the wild

A Fourth Teenager was arrested over TalkTalk data breach

British police announced Tuesday they had arrested a fourth teenager in connection with a data breach suffered by the Internet Service Provider TalkTalk. The investigation of the TalkTalk data breach is still […]

Posted in Cyber Security News | Comments Off on A Fourth Teenager was arrested over TalkTalk data breach

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X