A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs Snap packaging could reveal private data in Ubuntu 16.04 version Bangladesh Bank hacked due to inadequate defense systems Dutch police seize the Ennetcom encrypted communication network Security Affairs newsletter Round 57 – News of the week The […]
The CESG is considered the Information Security Arm of GCHQ, it has disclosed more than 20 vulnerabilities affecting multiple software this year. The British intelligence agency GCHQ has disclosed more than 20 vulnerabilities affecting multiple software. The information was shared by a GCHQ spokesperson with the Motherboard. The flaws were discovered by the CESG (Communications-Electronics Security Group), which […]
Watch the trailer for the Oliver Stone’s new film on the Snowden Story. This week I saw the trailer for new the Oliver Stone’s film on the Snowden‘s Story. Oliver Stone is one of my favorite filmmakers, it is the author of jewels like Scarface, JFK, and Platoon. His last opera focus on the story of the […]
A security vulnerability in AlphaBay, one the most popular black markets, could expose private messages and data of its users. One of the most popular black marketplaces, the AlphaBay, is affected by a serious flaw that could expose the private messages of its users. One year ago the operators behind the black market launched a fully automatic credit […]
An interview with Pete Herzog, the co-founder and Managing Director of ISECOM, about the Hacker Highschool (HHS) initiative. Today’s teens are in a world with major communication and productivity channels open to them and they don’t have the knowledge to defend themselves against the fraud, identity theft, privacy leaks and other attacks made against them […]
The data intelligence firm Flashpoint has published an interesting report that explore the cyber capabilities of the ISIS radical group. In the last days of April, Flashpoint a global leader in Deep and Dark Web data and intelligence published a report that is dedicated to the analysis of cyber capabilities of the ISIS with the […]
The Lansing Board of Water & Light (BWL) utility has had to shut down systems, phone lines in response to a ransomware-based attack. The Lansing Board of Water & Light (BWL) utility has had to shut down systems, phone lines in response to a ransomware-based attack. Another ransomware attack against a critical infrastructure is in […]
Developers often ignore that they are exposing sensitive data when they publish code containing their Slack access tokens on GitHub. It was the year 2015, the month of March when Slack officially posted the following statement on their corporate blog: “there was unauthorized access to a Slack database storing user profile information. We have since […]
Employee monitoring is a complex and controversial topic that can often become the source of discontent between employers and their staff. It is not a secret that most employees have a negative opinion about modern monitoring practices, such as PC monitoring. It is often viewed as an invasion of privacy and employer overstepping their authority. […]
The US Supreme Court has approved amendments to Rule 41 that allows judges issue search warrants for hack into computers located worldwide. The US Supreme Court has approved amendments to Rule 41, which now let U.S. judges issue search warrants for hacking into computers located also outside their jurisdiction. Under the original Rule 41, a […]