The Defense Advanced Research Projects Agency is calling for the development of a hacker-proof encryption App for the U.S. military. The US Defense Advanced Research Projects Agency (DARPA) is calling security experts to create a hacker-proof “messaging and transaction platform.” The project for a hacker-proof encryption App was proposed under the rules of the Small Business Technology Transfer […]
The Dutch police in an international effort with Canadian authorities seized the Ennetcom encrypted communication network used by 19,000 users. Another success of the Dutch law enforcement against the cybercrime. The police arrested the owner of Ennetcom, a provider of encrypted communications with more than 19,000 customers. Prosecutors suspect he was using the business to manage […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs American company lost $100 million to BEC fraud Europol and Italian Carabinieri an international ATM Skimming network Lottery security director hacked random-number generator to rig lotteries Security Affairs newsletter Round 56 – News of the week Experts […]
A feature in the Ubuntu 16.04 version could be abused to expose users private data posing a serious threat to their privacy and security. A feature in the last version of Ubuntu, the Ubuntu 16.04 version, could inadvertently expose users private data posing a serious threat to their privacy. According to the open-source software expert […]
Investigators discovered that the hackers managed to gain access to the Bangladesh Bank network because it was using second-hand switches and no firewall. In March, unknown hackers have stolen more than $100 million from the Bangladesh Bank account at the US Federal Reserve Bank. Now new disconcerting news regarding the Bangladesh bank is in the headlines. According […]
Facebook announced that the number of its users accessing through the Tor network has passed 1 million. The number is calculated over a period of 30 days. Facebook has announced Friday that it has passed 1 million Tor users. As announced in a blog post, the number is calculated over a period of 30 days. “Over […]
Software reverse engineering is frequently mentioned in several contexts, including many illegal activities. What does it mean? Software reverse engineering is frequently mentioned in the context of illegal activity: the stealing of IP, fraud with software licenses, and so forth. At the same time, reversing has legal applications, the most known of which is malware research. […]
The native Windows command-line utility Regsvr32 can be exploited to bypass MS Applocker and run remote code bypassing protection mechanisms. A security researcher recently discovered a vulnerability that may very well reap chaos in the Windows world, it can be used to bypass whitelisting protections such as Microsoft’s AppLocker. The Microsoft digitally-signed binary is a […]
The security expert Chris Vickery discovered a 132 GB MongoDB database open online and containing 93.4 million Mexican voter records. Once again a MongoDB poorly configurated exposed million records, once again data of voters are left accessible online. This time, the popular researcher Chris Vickery has discovered on Amazon’s AWS online a 132 GB database containing 93.4 […]
Facebook hacked! The security expert Orange Tsai discovered the presence of a malicious webshell on one of the company servers. The security expert Orange Tsai from the DevCore firm has found a malicious web shell on Facebook Server. The researcher was analyzing the Facebook’s infrastructure when noticed a domain called files.fb.com. Intrigued, the expert has tried to access […]