Deutsche Telekom confirmed that more than 900,000 routers began to have serious problems connectivity problems due to a cyber attack. More than 900,000 routers belonging to Deutsche Telekom users in Germany were not able to connect to the Internet due to an alleged cyber-attack. The affected routers were used by the Deutsche Telekom customers also […]
The Japanese Government is investigating a reported security breach suffered by the High-speed Defence Information Infrastructure (DII) network. The Defence Information Infrastructure is a high-speed large-capacity communication network connecting SDF bases and camps. The Defence Information Infrastructure comprises two distinct networks, one connected to the Internet and an internal network. The security breach took place […]
Security experts from the CheckPoint firm discovered two different variants of the new Cerber 5.0 ransomware in a few weeks. Security experts have spotted a new variant of the dreaded Cerber ransomware, the Cerber 5.0. This is the third version of the malware released this week that is able to encrypt files on all accessible network […]
Last week, unknown attackers hacked the computer systems of the San Francisco’s Municipal railway giving riders a free ride all day on Saturday. Last week, hackers crashed the computer system of the San Francisco’s Municipal railway, unknown attackers took offline the ticket kiosks offline and gave riders a free ride all day on Saturday, until […]
The hackers Popopret and BestBuy are offering a DDoS-for-hire service leveraging a Mirai botnet composed of around 400,000 compromised devices. We have written a lot about the Mirai botnet after the clamorous attacks against the Dyn DNS service and the OVH hosting, it is a dangerous threat that was designed to target IoT devices that could be used to power massive DDoS […]
Security experts from Proofpoint firm observed scammers exploiting YouTube to promote their backdoored phishing templates. According to experts from the security firm Proofpoint, scammers are advertising on YouTube backdoored phishing templates offering also “how-to” videos and manuals. It is not a novelty, cyber criminals are switching on legitimate websites to propose their products and services. […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all, let me inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html THANK YOU! Surveillance solutions from Moxa and Vanderbilt firm affected by flaws A second backdoor in a […]
Unfortunately, many smartphones have never been designed with security in mind, which are the most secure smartphones? Enjoy it! In general, smartphones have never been designed with security in mind. The emphasis has always been on features and capabilities while security is usually relegated to the back burner. And, while no internet-connected device is 100% […]
Bounty hunter Kevin Roh has discovered several security vulnerabilities in the Uber UberCENTRAL Tool that exposed user data. Security expert and bounty hunter Kevin Roh has discovered several security vulnerabilities in Uber’s UberCENTRAL Tool that exposed user data. The UberCENTRAL service was launched in July, according to the company it is a dashboard that enables any business to request, manage, […]
Kapustkiy hacked the High Commission of Ghana & Fiji in India, he also confirmed to have joined the Powerful Greek Army hacked crew. Last week, the hacker Kapustkiy, one of the most active hackers at this moment, hacked the India Regional Council, today he sent me a message to announce to have hacked the High Commission of […]