Google announced a new feature in the Safe Browsing warning set, it will warn users when they will receive an email message from an unauthenticated sender. Google always takes care of security, the last features announced by the IT giant will warn Gmail users when they receive an email message from an unauthenticated sender. Google […]
Experts from Heimdal security firm discovered a new crimeware kit, the Scylex malware kit, that aims to provide Zeus-grade Capabilities. Security experts from the Heimdal security firm have discovered a new DIY financial crime kit offered for sale on a notorious malicious hacker forum on the dark web called Lampeduza. The new crime kit, dubbed Scylex malware kit, […]
A group of experts devised a technique dubbed DiskFiltration to exfiltrate data from air-gapped networks relying on acoustic signals emitted from HDDs We are aware that air-gapped networks aren’t totally secure, security experts have devised several methods to exfiltrate information across the years. The last technique presented by a group of researchers was dubbed ‘DiskFiltration’ […]
Is it possible to hack voting machines? According to cyber security experts, it is possible due to the use of outdated systems. The recent attacks against the DNC and Hillary Clinton‘s server raised the question about the cyber security of entire US election machine. Speaking at the Aspen Security Forum, Lisa O. Monaco, homeland security […]
Information warfare – The development of cyber capabilities is strategic for any governments, computer systems and Internet of Things even more at risk. By the mid-1990âs the US intelligence agencies, especially the NSA, were beginning to wake up to a grim reality â the world was quickly becoming connected and the tools to connect that […]
A new hack leveraging on two distinct vulnerabilities could be exploited to open every Volkswagen vehicles that have been sold since 1995 Do you have a Volkswagen? A new hack leveraging on two distinct vulnerabilities could be exploited to open every Volkswagen vehicles that have been sold since 1995, including models from Audi, Citroen, Fiat, Ford, […]
vBulletin forums need to be patched asap to avoid attackers to scan servers hosting the CMS and remotely execute arbitrary code. Hackers breached the Steam’s Dota 2 forums and have leaked a couple of million credentials (the archive contains MD5-hashed passwords), but what is happening to forums based on the popular vBulletin CMS? vBulletin forum administrators need […]
Today I have interviewed RootPhantom, another member of the popular hacker crew Phantom Squad. Enjoy the interview! You are a talented hacker that has already participated in several hacking campaigns, could you tell me more about. We did shut down the PSN and Xbox services last year. Could you tell me which his your […]
A severe design flaw in the Linux kernel could be exploited by attackers to hijack traffic, inject malware into connections, and run a wide range of attacks. A severe flaw in the Linux kernel could be exploited by attackers to hijack traffic, inject malware into downloads and web pages, and run a wide range of […]
Once again Microsoft failed in fixing a severe Secure Boot vulnerability that can be exploited to install rootkits on Windows devices. Microsoft has accidentally leaked the Secret keys to Bypass UEFI Secure Boot. The Secure Boot is a UEFI (Unified Extensible Firmware Interface) feature that should prevent the execution of unauthorized code during the boot process. The […]