Monthly Archives: May 2015
Tracking wearable devices could be very easy via Bluetooth Low Energy
Researchers at Context Information Security have demonstrated that it is very easy to monitor IoT devices that implement the Bluetooth Low Energy protocol. Internet of Things are enlarging our surface of […]
The Phantom Menace, who targeted the oil tankers?
Panda Security firm released a report regarding a hacking campaign dubbed “Operation Oil Tanker: The Phantom Menace” that targeted oil tankers. Security researchers at Panda Security have released a report on […]
Yemen Cyber Army hacked principal Saudi Gov networks
The group of hackers known as Yemen Cyber Army has hacked the computer systems at Saudi Arabia, they control also Interior Ministry and Defense Ministry. The group of hackers known […]
Android Factory reset fails to wipe sensitive user data, million devices at risk
Two security researchers demonstrated that the Android Factory Reset process fails to wipe private data from Android mobile devices. Researchers at Cambridge University, Laurent Simon and Ross Anderson, revealed that half a […]
CareFirst data breach affects about 1.1M people
CareFirst BlueCross BlueShield fall victim of a major data breach, personal information belonging more than one million individuals could have been exposed. Health insurer CareFirst BlueCross BlueShield is notifying more […]
Unknown Hackers hit systems at Bundestag
The Bundestag has become the target of a significant cyber attack, hackers tried to compromise the internal network of the German Parliament. The German parliament Bundestag has officially confirmed media […]
Are Artificial Pancreas vulnerable to cyber attacks?
A team of researchers explains that million of lives potentially depends on the resilience to cyber attacks of a new generation of “artificial pancreas.” Medical devices are open to cyber attacks, […]
ISIS – Cyber Caliphate hackers are threatening Electronic War
Pro-Isis Hackers belonging to Cyber Caliphate hacking team threaten ‘Electronic War’ on US and Europe. Which are ISIS cyber capabilities? Is the Islamic State group able to engage a cyber war against Western […]
Is your smartphone being tracked? We asked an expert
In the movies, people on the run are often hunted down because of their cell phones. There are countless scenes where expensive smartphones are smashed to bits, or dropped in […]
Chinese hackers hit Penn State University, 18K people impacted
The Penn State suffered a high sophisticated cyber attack that that seems to be originated from China and that exposed data belonging to 18K people. The Pennsylvania State University’s College […]
VENOM vulnerability opens millions of virtual machines to attack
The VENOM vulnerability A security vulnerability recently patched is scaring the IT industry, its name is VENOM and it is coded as CVE-2015-3456. The dreaded vulnerability was first discovered by Jason […]
Google Hangouts doesn’t use end-to-end encryption, law enforcement can access it
Google Hangouts doesn’t implement end-to-end encryption, when users message or talk with someone on Hangouts is exposing to Government Wiretapping. Edward Snowden has revealed how the US intelligence spy on […]
Law enforcement warns of Nepal Earthquake Scams
FBI and security researchers have uncovered fraudulent activity pertaining to relief efforts associated with the tragic Nepal earthquake. Cyber criminals have no scruples, they are always ready to exploit any […]
US SOCOM and The Special Forces to Scrutinize Social media
US SOCOM admitted that Counter-Terrorism Special Forces scrutinize FaceBook and other social media to handle potentially useful information. Exactly two years ago I wrote about the use of social media in the Military. […]
Flawed Open Smart Grid Protocol is a risk for Smart Grid
More than four million smart meters and similar devices worldwide are open to cyber attacks due to the security issued in the Open Smart Grid Protocol. The Open Smart Grid […]
Australian 19 year-old who hacked Microsoft and US Army is fugitive
An Australian teenager who hacked Microsoft, Valve and the US Army has left the Australia. The Interpol is searching for him in Europe. An Australian teenager, who had allegedly hacked […]
Password for systems at a London rail station revealed during a TV documentary
The passwords for the signal system of the control room at the Waterloo rail station in London were disclosed during a TV documentary. We cannot think of lock down the […]
Trustwave discovered the first political malvertising campaign
Experts at Trustwave observed a group of cyber criminals helping spread pro-Russia propaganda by inflating video views with a malvertising campaign. Security experts at Trustwave have discovered a botnet, originally designed […]
Thousands Linux and FreeBSD servers infected with Mumblehard spamming malware
The sophisticated Mumblehard spamming malware infects thousands of Linux and FreeBSD servers going under the radar for at least five years. In the last seven months, several thousand Linux and FreeBSD […]
How to exploit flaws in InFocus IN3128HD Projector to hack the host network
The firmware running on the InFocus IN3128HD Projector is affected by an authentication bypass flaw which allows the hack of the host network. Another smart object was found vulnerable by security experts, it is […]