Hack the Pentagon – DoD would invite outside hackers to test the cybersecurity of some public US Defense Department resources as part of a pilot initiative. Which is the best way to discover security vulnerabilities affecting a computer system? Ask a group of hackers to test it. This is the concept behind a bounty program, […]
The DarkHotel APT group is back and it is targeting executives at telecommunications companies in China and North Korea. According to threat intelligence start-up ThreatBook, the DarkHotel APT group is targeting executives at telecommunications companies in China and North Korea. The Darkhotel espionage campaign was first uncovered by security experts at Kaspersky Lab in November 2014. The experts […]
Brazilian authorities arrested the Facebook Vice President for Latin America accused of ignoring judicial order in drug trafficking investigation. Law enforcement worldwide is increasing their pressure on IT companies for accessing users’ data, while we are discussing the San Bernardino case (aka Apple vs FBI) another news is shocking the industry, Facebook Vice President has been arrested […]
Security experts presented the DROWN attack that exploits a new critical security vulnerability affecting the OpenSSL. Security experts have discovered a new critical security vulnerability affecting the OpenSSL, it has been estimated that more than 11 Million websites and e-mail services are open to cyber attacks. The new attack, dubbed DROWN (stands for Decrypting RSA with […]
The federal magistrate Judge James Orenstein has ruled in favor of Apple, rejecting the FBI request to unlock an iPhone. In the last weeks, we have followed the dispute between Apple and FBI regarding the possibility to unlock the iPhone used by one of the San Bernardino shooters. The FBI required Apple to modify the iOS operating system running […]
The General Data Protection Regulation (GDPR) governs the use and privacy of EU citizens’ data and the Data Protection Directive governs the use of EU citizens’ data by law enforcement. EU Data Protection Reform was put forward in January 2012 by the European Commission to make Europe fit for the digital age. At the last […]
A new OS X sample of the Hacking Team RCS has been detected in the wild, who is managing it? Is the HackingTeam back? A group of malware researchers has discovered a new strain of Mac malware undetected my most security firm, but more intriguing is the speculation that the malicious code may have been […]
A coordinated operation of law enforcement agencies in 7 countries raided operators of darknets trading in illegal products and services. A joint effort of law enforcement agencies in seven European countries (Germany, Bosnia, Switzerland, France, the Netherlands, Lithuania and Russia) allowed authorities to identify and arrest operators of darknet online platforms trading in illegal products […]
The Raspberry Pi 3 model B comes with significant improvements and it is now available for sale for $35, the same price as the existing Raspberry Pi 2. It’s arrived, the Raspberry Pi Foundation has presented a new Raspberry Pi model the Raspberry Pi 3 Model B.The Raspberry Pi 3 Model B in the successor of the Raspberry Pi […]
The security researchers at FireEye Abdulellah Alsaheel and Raghav Pande have found a way to exploit Microsoft EMET (Enhanced Mitigation Experience Toolkit) to hack itself. The security researchers at FireEye security Abdulellah Alsaheel and Raghav Pande have found a way to exploit the Microsoft security tool Enhanced Mitigation Experience Toolkit to hack itself. The Enhanced Mitigation […]