Tails 2.0 is available for download, it implements new features, including security improvements. Speaking about privacy and operating system, we are obliged to mention the popular Debian-based distribution Tails âThe Amnesiac Incognito Live System.â Now the version 2.0 is available online! Tails is a popular live operating system specifically designed to protect user privacy and […]
The ISIS radical group is trying to infiltrate the Indian hacking community by offering money to hack government websites. 30,000 people on social media have been already contacted by the group. Members of the ISIS are willing to pay Indian hackers to hack into government websites and gain access to sensitive documents. The radical organization […]
The cPanel Inc. company that manages the popular web hosting account management tool is warning customers about a possible data breach occurred over the weekend. According to the cPanel firm customers’ account information may have been compromised, hackers tried to access a database containing usersâ data, including names, salted passwords, and contact information. cPanel Inc. added that […]
ENISA has issued the annual ENISA Threat Landscape 2015 a document that synthesizes the emerging trends in cyber security I’m very happy to announce the publication of the annual ENISA Threat Landscape 2015 (ETL 2015), this is the fifth report issued by the European Agency. The ENISA Threat Landscape 2015 summarizes top cyber threats, experts have identified […]
According a report from the Nuclear Threat Initiative, numerous nations are not prepared’ to handle the cyber attacks focusing on their nuclear facilities. Numerous nations are not “prepared” to handle the cyberattacks focusing on their facilities linked to nuclear programs, as per a recent report from the NTI (Nuclear Threat Initiative). The Nuclear Threat Initiative is a […]
The Turkish security researcher Utku Sen was blackmailed by hackers behind the Magic ransomware to close his projects. The developers behind the open source-based âMagicâ ransomware are blackmailing the creator of Hidden Tear and EDA2 in order to force the developer to abandon the projects. Recently I have written about the RANSOM_CRYPTEAR.B ransomware developed Utku Sen starting from a proof-of-concept […]
The Israeli Public Utility Authority is suffering one of the largest cyber attack that the country has experienced, Minister of Infrastructure, Energy and Water Yuval Steinitz said on Tuesday. The Israel’s Minister of Infrastructure, Energy and Water, Yuval Steinitz, told CyberTech 2016 attendees in Tel Aviv that the Israeli Public Utility Authority suffered a severe cyber attack. […]
The U.S. House Oversight and Government Reform Committee is probing US Government Agencies over use of backdoored Juniper equipment. A number of US Government Agencies are concerned about the use of Juniper firewalls affected by the recently uncovered backdoor. The U.S. House Oversight and Government Reform Committee has sent letters to dozens of government agencies and departments asking […]
According to Palo Alto Networksâ Unit 42 the Chinese APT group Codoso has been targeting organizations in various industries in a new wave of cyber attacks. The group of experts at Palo Alto Networks Unit 42 have uncovered a new cyber espionage operation conducted by the Chinese AT Codoso (aka C0d0so0 or Sunshop Group). The Codoso hacking crew has been […]
It is the joke of these hours,users are sharing a link to crashsafari.com on social media platform that could crash friends’ iPhone and iPad. Do not open any a link to crashsafari.com on your iPhone, iPad or even Macs, visiting the website will cause the Safari application to crash and Apple device to restart. Obviously, […]