The Tor officially announced to launch the Tor Bug Bounty Program in the next year, a great news for the Tor community. The non-profit organization that is maintaining the TOR project plans to launch very soon a Tor Bug Bounty Program for researchers who find vulnerabilities in the popular anonymizing platform. This is a great for all the […]
The US Department of Corrections discovered a long-standing software bug that resulted in the early release of prisoners. This news is disconcerting and demonstrates the importance to carefiìully consider the technology in our lives. The Washington State Department of Corrections (DoC) launched an investigation after it early released 3,200 prisoners over the course of 13 years. It […]
The Ukrainian Government is blaming Russians state-sponsored hackers for a number of electricity cut-offs occurred in Western Ukraine. The Ukrainian Government is suffering a series of power outages in the Western region of the country likely caused by cyber attacks. The Ukrainian Government believes that the power outages are caused by operations conducted by Russian […]
A former employee at stole the source code of the Yandex Search Engine and its algorithms and tried to sell the for tens of thousands of euro. A former employee, Dmitry Korobov, of Russian search engine Yandex is accused of stealing the source code and algorithms implemented by the company. The man alleged attempted to sell […]
If you login to Windows 10 using your Microsoft account you have to know that your computer automatically uploaded a copy of your recovery key. New Windows computers implement a built-in disk encryption feature that is turned on by default to protect user data in case the device is lost or stolen. Be aware, this device encryption […]
Adobe has released security patches for Adobe Flash Player to fix critical vulnerabilities that could be exploited to take control of the affected system. Adobe released an emergency patch for Flash Zero-Day (CVE-2015-8651) that is currently being exploited in targeted attacks. The out-of-band security update issued on Monday fix a number of security vulnerabilities that could be exploited […]
China passed it first controversial Anti-Terrorism law that requires technology firms to help decrypt information and much more. China Passes its first Anti-Terrorism law that will have a serious impact on all those companies that want to operate in the country. The Anti-Terrorism law establishes that Operators of telecommunications and Internet services operating in China have to […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs FBI investigates on Juniper hack, is it a nation-state attack? Phone House – Personal data of 12+ million Dutch mobile customers open to hackers Phantom Squad plans to hack PSN and Xbox, SkidNP hacks its website Hillary […]
The security expert Chris Vickery has discovered a misconfigured archive exposes the personal details of 191 million U.S. voters. A misconfigured database is the root cause of the exposure of around 191 Million voter records. The records include voters’ full names, unique voter IDs, unique voter IDs, date of births and phone numbers. The database […]
Which are the main events observed in the darkweb during the 2015 and what to expect in the next 12 months? The DarkWeb is a set of publicly accessible content that are hosted on websites whose IP address is hidden, but to which anyone can access it as long as it knows the address. The […]