A number of iOS devices are being held ransom by the Russian “Oleg Pliss” who is demanding a payment of $100 to unlock the device. Basically the hijack is being done using stolen iCloud passwords and the “locate device” feature to lock the device and display a message to the affected user. Now how the passwords […]
NATO on Cyber Defence – The cyberspace has become the new battlefield and an ingreasing number of threats leverages on it to target real world assets. ‘We want eight and we won’t wait!’ What could this slogan or chant be for? Maybe Quentin Tarantino was only writing about 7 Hateful people and his publisher wanted […]
If you are one of the victims of the Jigsaw ransomware there is a good news for you, experts from CheckPoint Security have defeated it once again. Let’s start the day with a good news, the Jigsaw ransomware has been decrypted again. The JIGSAW ransomware was first spotted in April when experts noticed that the threat slowly […]
What about cyber security issues discussed during the NATO members during the Warsaw summit held in Poland on 8 and 9 July 2016. At the Warsaw Summit this weekend NATO, as anticipated weeks ago, the alliance has officially recognised cyberspace as a military operational domain. This means that the NATO alliance will respond with conventional […]
Experts from Talos team have found a link between the drop in the Angler Kit usage and the crackdown against the Lurk gang. Security experts believe to have found a link between the drop in the Angler Kit usage and the crackdown against the Lurk gang. Law enforcement arrested suspects in June, authorities accused them […]
Terrorism – JIHADIST OPS – Jul.03-10, 2016 – This is merely an intel brief. Subscribe GII for a more comprehensive and developed MENA and/or SE Asia report. GLOBAL INTELLIGENCE INSIGHT Global Intelligence Insight delivers reports on worldwide jihadist operations with a particular focus on the Middle East and North of Africa, partnering with SecurityAffairs.co and […]
ProofPoint have found in the wild a backdoored version of the popular Pokemon GO Android App that could allow attackers to gain control over victim’s device The gamers are going crazy for the last Nintendo game Pokemon GO which uses augmented reality , the mobile app is used by players to walk around and collect […]
A Ukrainian Hacker has breached the servers of the Polish Telecom Company Netia SA and leaked on an underground forum the stolen data. A Ukrainian hacker going by the pseudonym of Pravy Sektor has hacked the servers of Poland’s telecom company Netia SA, the second largest telecom company in the country. The hackers stole personal details […]
A group of researchers has devised a new method for hacking mobile devices by using hidden voice commands in YouTube videos. A group of researchers from the University of California, Berkeley, and Georgetown University has devised a method for hacking mobile devices by using hidden voice commands embedded in YouTube videos. In order to hack […]
Today, thanks to the support of Aveek Sen, I have interviewed the hacker that goes online with the pseudonymous of s1ege. s1ege is a member of the Ghost Squad and was one of earlier components of the AnonGhost hacker collective. The split occurred as Mauritania Attacker and few others of AnonGhost joined ISIS. Enjoy the interview […]