A former employee at stole the source code of the Yandex Search Engine and its algorithms and tried to sell the for tens of thousands of euro. A former employee, Dmitry Korobov, of Russian search engine Yandex is accused of stealing the source code and algorithms implemented by the company. The man alleged attempted to sell […]
If you login to Windows 10 using your Microsoft account you have to know that your computer automatically uploaded a copy of your recovery key. New Windows computers implement a built-in disk encryption feature that is turned on by default to protect user data in case the device is lost or stolen. Be aware, this device encryption […]
Adobe has released security patches for Adobe Flash Player to fix critical vulnerabilities that could be exploited to take control of the affected system. Adobe released an emergency patch for Flash Zero-Day (CVE-2015-8651) that is currently being exploited in targeted attacks. The out-of-band security update issued on Monday fix a number of security vulnerabilities that could be exploited […]
China passed it first controversial Anti-Terrorism law that requires technology firms to help decrypt information and much more. China Passes its first Anti-Terrorism law that will have a serious impact on all those companies that want to operate in the country. The Anti-Terrorism law establishes that Operators of telecommunications and Internet services operating in China have to […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs FBI investigates on Juniper hack, is it a nation-state attack? Phone House – Personal data of 12+ million Dutch mobile customers open to hackers Phantom Squad plans to hack PSN and Xbox, SkidNP hacks its website Hillary […]
The security expert Chris Vickery has discovered a misconfigured archive exposes the personal details of 191 million U.S. voters. A misconfigured database is the root cause of the exposure of around 191 Million voter records. The records include voters’ full names, unique voter IDs, unique voter IDs, date of births and phone numbers. The database […]
Which are the main events observed in the darkweb during the 2015 and what to expect in the next 12 months? The DarkWeb is a set of publicly accessible content that are hosted on websites whose IP address is hidden, but to which anyone can access it as long as it knows the address. The […]
The Ramnit botnet that has been disrupted by European law enforcement in February is back and it’s targeting online banking worldwide. Security researchers at IBM Security have discovered a new variant of the popular Ramnit Trojan. This year law enforcement agencies from several European countries coordinated by the Europol have taken over the botnet composed […]
Two German security experts have exposed a number of serious flaws in credit card payment systems that put users at risk. The duo of German security experts, Karsten Nohl and Fabian Braunlein, found a new vulnerability in payment terminals that could be exploited by hackers to steal money. Differently from past attacks, this time, the hackers […]
The Tel Aviv-based Rayzone Group is offering for sale a gadget called InterApp that can intercept and exfiltrate information from nearby smartphones. InterApp is a device designed by the Israeli Rayzone Group that can spy on any smartphone. “InterApp system enables to get intimate information of any phone user, which is in the system’s ,proximity. The collected […]