A team of Israeli researchers has devised a new technique to exfiltrate data from a machine by using a malware that controls router LEDs. A few months ago a group of researchers from Israeli Ben-Gurion University devised a new technique to exfiltrate data from a machine by using a malware that controls hard drive LEDs, now […]
Browsers are constantly targeted by hackers. Here are 4 ways you can make your browser hacker-proof. Use them to stay secure on the web. Browsers have long been a hot target of numerous hacking-related incidents. They are the primary source of hacking incidents as we search, share, watch and download files from browsers. Moreover, various […]
The FBI agents arrested the NSA contractor Reality Leigh Winner for leaking the top-secret report, here’s how she was identified. Yesterday the online news outlet The Intercept published a top-secret NSA report that shows Russian state-sponsored hackers tried repeatedly to hack the US voting systems before last 2016 Presidential election. A few hours later, it is […]
Is the hack back legal? There is a heated debate about the concept of active defense. What about the Active Cyber Defense Certainty (ACDC) Act? In a time where attribution of cyber crimes is all but impossible, the idea of allowing companies to ‘hack back‘ at their attackers seems far-fetched. However, Tom Graves (R-GA) has […]
Malicious ads in Google search results for the US retail giant Target redirected users to a tech support scam. The malvertising campaign was first reported last week by a US user who posted his observations to a StackExchange thread and was then reported by Bleepingcomputer.com. Just querying Google for the term “target,” users were displayed on the […]
Russian intelligence powered a cyber attack on at least one US voting software supplier and sent spear-phishing emails to election officials just days before Election The online news outlet The Intercept obtained access to a top-secret NSA report that shows Russian state-sponsored hackers tried repeatedly to hack the US voting systems before last 2016 Presidential election. […]
Experts killed tens of thousands of subdomains used by crooks to host the RIG Exploit Kit that were set up with a domain shadowing campaign. GoDaddy and RSA Security, with the support of other security companies and researchers, have shut down tens of thousands of illegally established subdomains used by crooks to host the RIG Exploit […]
Security experts reported crooks are using a new technique to deliver malware through PowerPoint files, researchers warn of attacks in the wild. Crooks are using a new technique to deliver malware through PowerPoint documents. Security researchers recently discovered several malicious PowerPoint files that exploit the mouseover events to execute PowerShell code. Threat actors are sending out spam […]
US judges have other opinions to punish suspects that decide to don’t collaborate with police giving the iPhone passcode to unlock their devices. Forgetting passwords for an electronic device could be an option for suspects to avoid complying with a court order, but sometimes things can go wrong. US judges have other opinions to punish suspects that […]
Recent Qatar hack is sparking diplomatic tensions in the Gulf, Saudi Arabia, the United Arab Emirates, Egypt and Bahrain cut ties to the country. Saudi Arabia, the United Arab Emirates, Egypt and Bahrain say they want to interrupt any diplomatic relation with Qatar. According to Al Jazeera, the Saudi kingdom made the announcement via its […]