The Euro 2016 will be held in June in France and online fraudsters already started launching football-themed spam campaigns on the event. <img height=”1″ width=”1″ alt=”” style=”display:none” src=”https://www.facebook.com/tr?ev=6037454831409&cd[value]=0.00&cd[currency]=RUB&noscript=1″ /> Major events such as the Euro 2016 represent a great opportunity for criminal organizations. In conjunction with international football tournaments such as the World Cup and […]
White Hackers from Positive Technologies demonstrate how to exploit SS7 protocol to impersonate WhatsApp and Telegram users and act on their behalf. Both WhatsApp and Telegram messaging services have implemented the end-to-end encryption for chats in order to protect the privacy of their users and improve their security. Is it enough to keep prying eyes far from them? No, according to a […]
A group of white hat hackers from RedTeam traveled to the Midwest to test the systems of a major power company and breach it with Social Engineering. RedTeam Security is a group of ethical hackers who specialize in offensive security, believing that the best defense is a good offense. Engaging in social engineering, in addition […]
The security expert David Levin was arrested and charged after discovering  serious security flaws on a couple of election websites in Florida. The security researcher David Levin, the owner of Vanguard Cybersecurity, was arrested and charged after discovering  serious security flaws on a couple of elections websites in Florida. In December Levin discovered that the elections website […]
Twitter has blocked the US intelligence agencies from accessing a service that allows the real-time analysis of the content posted online. According to The Wall Street Journal, that cited a senior US intelligence official, Twitter has blocked US intelligence agencies from accessing a service that analyzes the content posted online through the social media platform in […]
A study conducted by Recorded Future on PoC exploits shared online over the last year shows that social media is the main distribution channel. Security experts at the threat intelligence firm Recorded Future have conducted an interesting study on the proof-of-concept exploits shared online (e.g. On Twitter, on forum linking to personal blogs, GitHub, or Pastebin) last year. […]
According to 2015 intelligence transparency report, the searches of US citizens made by the NSA and CIA intelligence agencies have almost doubled since 2013 If you believe that the Snowden‘s revelations have stopped or limited the surveillance activities you are obviously wrong. The diffusion of the technology and the increasing threats of espionage and terrorism is […]
Hackers demonstrated to the Tech Insider how to break into any office by purchasing from Amazon and eBay $700 worth of electronic parts to clone access cards. Breaking into a company could be very easy and cheap for hackers, it could be sufficient to buy from Amazon and eBay $700 worth of parts. “We watched a […]
This is the first of a series of  âHacker Interviewsâ that will aim to help us get a better understanding of the motivations and techniques of the hackers. The information security industry spends time and effort not only to stop hackers but also to understand and simulate them. Vulnerability assessments and penetration tests are specially […]
Arthur Budovsky, the co-founder of the online underworld bank Liberty Reserve, was sentenced to 20 years in prison for committing money laundering. Arthur Budovsky, the co-founder of the online underworld bank , was sentenced to 20 years in prison. The man had pleaded guilty to one count of conspiring to commit money laundering. He was condemned […]