According to Google, Google is a âpartially dangerousâ website because some pages on google.com contain deceptive content. According to Googleâs online transparency report, Googleâs main search engine is a âpartially dangerousâ website. The company has advised that people should exercise caution when using it. The search engine could attempt to steal the personal information of […]
Anonymous announced OnionIRC, a new chatroom in the DarkWeb dedicated to teaching hacking and coding techniques and encryption mechanisms. Anonymous, the most popular collective of hacktivists, has announced a new chatroom in the DarkWeb dedicated to teaching its sympathizers hacking and coding techniques and encryption mechanisms. onionirchubx5363 . onion Port 6667 SSL: Port 6697 â Anonymous (@OnionIRC) […]
FireEye has discovered a new strain of POS malware dubbed Multigrain that steals card data from point-of-sale systems and exfiltrates it over DNS. Security experts at FireEye have spotted a new strain of the NewPosThings PoS malware, dubbed Multigrain, that steals payment card data from point-of-sale (PoS) systems and exfiltrate it via DNS to avoid detection. The technique is […]
Security researchers at the MIT designed an Artificial Intelligence system called AI2 that is able to detect 85 percent of attacks. While the number of cyber attacks continues to increase it is becoming even more difficult to detect and mitigate them in order to avoid serious consequences. A group of researchers at MIT’s Computer Science […]
Incredible, secret plans for NATO exercise Joint Warrior 161 were accidentally sent to Scottish fishermen and ferry operators emails. During the First World War, allied forces were able to read a lot of German radio traffic because of codebooks falling into allied hands. Eerily reminiscent of those days, NATO forces recently ran into a similar scenario, […]
Security experts eavesdropped and geographic tracked a US Congressman only using his phone number by abusing the SS7 protocol. Hackers eavesdropped and geographic tracked a US Congressman only using his phone number. Security experts will be no surprised, I wrote many articles on the topic explaining that security flaws in the SS7 protocol could be exploited by an attacker to […]
Experts analyzed a dozen attacks that leveraged on malicious RTF documents created using the same Four Element Sword builder. Security experts at Arbor Networksâ Security Engineering and Response Team (ASERT) have spotted a tool used in advanced persistent threat (APT) attacks against organizations in East Asia. The researchers have analyzed a dozen attacks that leveraged on malicious Rich […]
IBM Security has warned the WordPress community about a spike in the number of attacks leveraging a specific variant of the PHP C99 Webshell. Security experts at IBM reported a spike in the number of cyber attacks pushing a variant of the popular C99 webshell in February and March, a 45 percent increase compared to the previous period. […]
The Metropolitan Police confirmed that a drone hits a British Airways plane while landing at the Heathrow Airport, and the number of incidents is increasing The Metropolitan Police confirmed that a drone hits a British Airways plane while landing at the Heathrow Airport. The news is disconcerting and highlights the dangers related to the use […]
A group of experts at VoidSec used a Grey Box approach to assess the security posture of some important aspects of Avactis PHP Shopping Cart. Avactis is an open source ecommerce Shopping Cart platform most used in US and UK. Security experts from VoidSec analyzed the e-commerce software discovered an impressive number of vulnerabilities. The group of experts […]