Monthly Archives: October 2015
WhatsApp collects phone numbers, call duration, and a lot of metadata
A group of experts has conducted a research that demonstrates the type of data that can be gathered through the forensic study of WhatsApp. A new research conducted by forensic […]
15-Year-Old has been identified and arrested for TalkTalk Attack
The UK Metropolitan Police announced to have arrested on suspicion of Computer Misuse Act offenses a 15-Year-Old alleged involved in the TalkTalk attack. The UK Metropolitan Police has announced the […]
Duuzer, a data stealer Trojan targets South Korean organizations
Researchers at Symantec uncovered bad actors that have been using a backdoor Trojan dubbed Duuzer to target organizations in South Korea and elsewhere. According to Symantec, threat actors have been […]
Germany probes alleged new case of US espionage: Regin malware infected Gov laptop
The German authorities have launched a probe into allegations of a new case of US espionage after they have found a laptop infected by the Regin Spyware. The German authorities […]
TalkTalk announced hackers have stolen ‘incomplete’ customer bank data
Hackers that recently breached the systems at TalkTalk IPS have stolen ‘incomplete’ customer bank data, states an official announcement issued by the firm. This week the TalkTalk Telecom Group plc has publicly […]
Wikileaks releases CIA Director John Brennan emails
Wikileaks has obtained and immediately released the CIA Director John Brennan private emails. It is a first lot, others will be soon published. A few days ago a teen has violated […]
The ISIL is trying to hack American electrical power companies
US authorities confirmed that hackers belonging to the Islamic State (ISIL) are trying to hack American electrical power companies. According to the U.S. law enforcement, the ISIL is trying to […]
Pawn Storm used a new Flash Zero-Day in attacks on the NATO & the White House
Researchers at Trend Micro discovered a new Adobe Flash Zero-Day used in Pawn Storm Campaign Targeting Foreign Affairs Ministries across the world. Once again Flash in the headlines, beware next […]
US Ports – Cyber attacks can cause the release of dangerous chemicals
US Ports are still vulnerable to cyber attacks that release dangerous chemicals, cybersecurity in the maritime industry is crucial for Homeland security. Critical infrastructure across the world are vulnerable to cyber […]
Apple has removed several apps from the official iOS App Store
Apple has removed mobile apps from the iOS Apple store that are installing root CA certificates that enable traffic to be intercepted. Apple has pulled several apps out from the […]
MEF – Annual Report 2015 – Payment card frauds
The CENTRAL MEANS OF PAYMENT ANTIFRAUD OFFICE (UCAMP) of the Italian Ministry of Economy and Finance released the annual report on Payment card frauds. This year I’m among the experts who […]
China arrested hackers responding to a US Government request
For the first time, hackers have been arrested in China by law enforcement at the behest of the US government. Is it true cooperation? It is probably the first time that […]
Hacking enterprise wireless Printers with a drone or a vacuum cleaner
A group of researchers from the iTrust has demonstrated how to use a Drone to intercept wireless printer transmissions from outside an office building. Recently I wrote a blog post […]
The Smurf Suite – GCHQ can hack your phone with a text message
Snowden told the BBC’s Panorama that the GCHQ has developed a hacking suite dubbed Smurf Suite, it can hack any mobile by sending an encrypted text message. There is no […]
Fareit malware avoids detection using a different file hash for each attack
Security experts at Cisco Talos have discovered a new strain of the Fareit Info stealer that uses a different File hash for each attack to avoid AV Detection Security experts […]
YiSpecter iOS Malware can infect any Apple iOS device
Experts at Paloalto Networks discovered a strain of Apple iOS malware dubbed YiSpecter that is able to infect both jailbroken and non-jailbroken devices. The recent XCodeGhost attack suffered by Apple demonstrated that […]
Experian’s data breach puts 15 million T-Mobile users at risk
Experian’s data breach puts 15 million T-Mobile users’ personal information at risk- The company already started the incident response procedure. T-Mobile has announced that data belonging to 15 million consumers may have compromised in a […]
Linux XOR DDoS Botnet delivers potent DDoS attacks
Experts at Akamai discovered the Linux XOR DDoS Botnet, a malicious infrastructure used to run potent DDoS attacks against dozens of targets. Security researchers have discovered a Linux Botnet, dubbed XOR […]
Are you still using TrueCrypt? Beware of these 2 critical flaws!
The popular security expert James Forshaw has discovered two critical flaws in the driver that TrueCrypt installs on Windows systems. Bad news for Windows users who have decided to use […]