Following a short disappearance, the xDedic market – the infamous ‘eBay’ of hacked servers, has made a new appearance on the Tor network. The xDedic market is still offering everyone from entry-level cybercriminals to APT groups fast, cheap and easy access to legitimate organizational servers. The domain (xdedic[.]biz) went offline following a report from Kaspersky […]
Millions of Xiaomi smartphone are affected by a critical remote code execution flaw that could be exploited by hackers to take over the mobile devices. Millions of Xiaomi mobile are vulnerable to remote hacking due to a critical remote code execution (RCE) vulnerability that could be exploited by hackers to take over the mobile devices. The […]
Microsoft has just fixed a the CVE-2016-3238 Print Spooler vulnerability that allows attackers to hack any version of Microsoft Windows. The July Microsoft Patch Tuesday includes security bulletins that address 50 security holes. Six security bulletins are rated critical, reading the them one advisory will catch the attention of the reader. Microsoft has fixed a security […]
The National Security Agency (NSA) has reportedly turned its focus on Tor and Linux users, having recently shown a keen interest in these users’ online activities. The NSA has gone as far as calling users of products such as The Amnesic Incognito Live System (Tails) and Tor as extremists. Readers of Linux Journal were also […]
Enjoy the interview with Chema Alonso (@chemaalonso), Chief Digital Officer at Telefonica, who is one of the most talented cyber security experts. Chema Alonso is currently Chief Digital Officer at Telefonica, he is one of the most talented cyber security experts, a skilled hacker that is considered a star of the IT security industry. Enjoy the […]
Experts have made a disconcerting discovery on the Dark Web, they have found a sophisticated government malware that could be used to target Energy Grids. We have discussed several times about the militarization of the cyberspace and the risks that a government malware goes out of control, what about is a powerful hacking tool is […]
A group of American boffins have devised a system dubbed Crypto Drop that working with a “save what you can” approach is able to defeat all ransomware. A group of researchers from the University of Florida and Villanova University has devised a technique, dubbed Crypto Drop, to defeat all ransomware. The team published a paper […]
Dear readers, I’m really proud and excited to share with you my interview with a legend Mr John McAfee. John McAfee is one of the spiritual father of modern cyber security, he developed the first commercial antivirus, but John is much more. He is the “artist” of security, a modern juggler of technology. Multi-talented and […]
A number of iOS devices are being held ransom by the Russian “Oleg Pliss” who is demanding a payment of $100 to unlock the device. Basically the hijack is being done using stolen iCloud passwords and the “locate device” feature to lock the device and display a message to the affected user. Now how the passwords […]
NATO on Cyber Defence – The cyberspace has become the new battlefield and an ingreasing number of threats leverages on it to target real world assets. ‘We want eight and we won’t wait!’ What could this slogan or chant be for? Maybe Quentin Tarantino was only writing about 7 Hateful people and his publisher wanted […]