This week it was discovered that the Tesco Android Bank app won’t run with the Orbot privacy tool installed on the user’s mobile device. I always highlighted the importance of censorship and internet monitoring, architectures like the Tor network are much more than evil tools in the hands of crooks, but probably someone has a different opinion. Tesco Bank […]
The NATO has officially declared cyberspace a warfare domain and confirmed that a cyberattack on any of its allies will be considered as an act of war. NATO officially recognizes the cyberspace as the fifth domain of a warfare so it could respond with conventional weapons in case of a powerful cyber attack. A cyberattack on one of […]
On Tuesday evening Github became aware of unauthorized attempts to access a large number of its accounts, in response the company has reset their passwords. GitHub announced it has reset the passwords of a number of accounts after the company noticed unauthorized access. The hackers used credentials leaked online after the numerous data breaches suffered […]
The FBI disclosed the data related Business e-mail compromise (BEC) crimes, hackers sought to steal over $3 billion through this illegal practice. Business e-mail compromise – BEC crimes are a serious problem for companies, hackers have sought to steal more than $3.1 billion from businesses exploiting this practice, the Federal Bureau of Investigation recently warned. The […]
If you need to test your environment in a short period of time the WarBerry Pi is the right device to gather information on the target network. WarBerry Pi is a device that could be used by pen testers to collect as much information as possible in a short period of time, without being noticed. In order […]
A hacker using the pseudonymous Guccifer 2.0, claimed responsibility for the cyber-attack on the Democratic National Committee (DNC). Yesterday, we blogged about the cyber-attack on the Democratic National Committee (DNC) that led a dossier of the presumptive Republican presidential nominee, Donald Trump. According to the US-based cyber security company CrowdStrike, two sophisticated Russian espionage groups, COZY […]
ISIS spokesman Abu Mohammed al Adnani recently called for attacks on the West during Ramadan, its alert for the EURO 2016 football competition. ISIS spokesman Abu Mohammed al Adnani recently called for attacks on the West during Ramadan. Omar Mateen, the terrorist who killed 50 people and injured dozens more at a gay nightclub in […]
A security advisory recently released by CISCO announce that three Cisco wireless kits are affected by a critical bug, but no fix is available at the moment. SOHO devices are among most targeted network components in the wild, they are often poorly protected or not properly configured exposing users to serious risks. In these cases, […]
The Democratic National Committee’s network was hacked by Russian hackers belonging to nation-state groups that have had access to the group’s communications and databases. Yesterday, the security research firm CrowdStrike reported on a cyber breach of the Democratic National Committee (DNS). CrowdStrikeâs incident response time discovered not one, but two hacking groups that it considers âsome […]
Hacking Facebook Accounts with just a phone number is possible, experts from Positive Technologies demonstrated it exploiting flaws in the SS7 protocol. Hacking Facebook accounts by knowing phone numbers it is possible, a group of researchers from Positive Technologies demonstrated it. “Researchers have proven just that by taking control of a Facebook account with only a phone number […]