The popular OpenSSH is affected by a user enumeration bug that could be exploited by a remote attacker to check a list of hacked credentials. A bug (CVE-2016-6210) in the popular OpenSSH crypto library could be exploited by a remote attacker to enumerate users on systems running SSHD. An attacker can exploit the bug to check […]
DARPA organized a challenge where 7 finalists will battle it out with the Artificial Intelligence system to detect flaws and scan networks for exploits. The Rio Olympics 2016 is something everyone is looking forward to. The sportsmanship, the record making, medals the spirit of the game and the hilarious doping scandals like the 1920’s grafting […]
Security researchers from Symantec have discovered a new variant of the Android.Fakebank.B banking trojan that prevents users from calling banks. Security experts from Symantec have spotted a new strain of mobile Trojan dubbed Android.Fakebank.B that prevents users from making outgoing calls to banks from their mobile devices. Android.Fakebank.B was first spotted in October 2013, it was able to […]
Today, thanks to the support of Sneaker, I have interviewed the hacker that goes online with the pseudonym of Mr Xer . I’m continuing to interview hackers that try to destroy the online propaganda of the Islamic State, people that are involved in a silent battle that many people still ignore. Today I’ll present you […]
Taiwanese law enforcement agencies are investigating malware-based attacks against ATMs of a national bank that resulted in a $2 million theft. Law enforcement in Taiwan investigating the attacks against ATMs of a major nations bank, the Taiwan’s First Bank. Crooks used a malware to withdraw more than $2 million from dozens of ATMs in the country, it […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all let inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html THANK YOU! Hacker Interviews â s1ege Realstatistics campaign leads to ransomware via compromised sites Security Affairs newsletter Round […]
A group of researchers has developed Riffle, a new anonymity scheme that provides better security and performance than others, including Tor. Tor is probably the most popular anonymizing network, million of users leveraged on it to protect their privacy and online anonymity. Now Massachusetts Institute of Technology researchers revealed a new anonymity architecture that could rival Tor. […]
Enjoy the interview with WauchulaGhost (@wauchulaghost), one of the most active hackers in the fight against the IS online. Military, law enforcement, and hackers have the same the same goal, disrupt the propaganda activities managed by the Islamic State and interfere with IS daily functions, like paying its fighters. There is a silent cyber army of […]
The malware dubbed Backdoor.MAC.Eleanor is embedded surreptitiously in the fake app EasyDoc Coverter.app and allows to control your webcam from the dark web Following the first ever instance of mac ransomware, recently reported by Palo Alto Networks. AÂ second piece of malware has been discovered in the wild. The malicious software dubbed Backdoor.MAC.Eleanor or OSX/Eleanor-A comes […]
The Ubuntu online forums have been hacked and the username, IP address, and email address of over two million users have been exposed. The Ubuntu online forums have been hacked for the second time in a few months and data of more than 2 Million users have been exposed. According to Ubuntu, the hackers exposed […]