The British Government as part of the Investigatory Powers Bill is planning to hack children’s smart toys to snoop on suspects. We discussed several times the possibility to spy on people through smart device, including smart toys. A couple of weeks ago, the security expert Matt Jakubowski explained that the new Wi-Fi-Enabled Hello Barbie can be hacked to extract […]
Censys is a new Search Engine for devices exposed on the Internet, it could be used by experts to assess the security they implement. Now the hackers and experts have a new powerful tool for their analysis, it is Censys, a search engine quite similar to the most popular Shodan. Censys is a free search engine that […]
Trend Micro announced that the Asian market are being targeted more than ever by well-funded cyber criminal group that appears very organized. The attacks rely on the Bifrose code to develop their backdoor, a malware that has been around since 2008. In 2014 it was reported that a new version of Bifrose appeared in the wild. Among the improvements observed […]
A New Zealander expert has found hundred of thousands of vulnerable engine immobilizers are remotely hackable due to a flaw. The New Zealander Lachlan Temple (@skooooch) has discovered hundred of thousands of vulnerable engine immobilizers are remotely hackable. The expert discovered a flaw in a popular cheap car tracking and immobilizer gadget that can allow remote attackers […]
Security firm Zscaler discovered a malicious campaign based on a new strain of the Spy Banker banking malware. Security experts at Zscaler discovered a malware-based campaign relying on a new strain of Spy Banker banking malware. Spy Banker is an old threat, it was first detected in 2009, the new variant spreads over social media, […]
The End-to-end encrypted database ZeroDB becomes open source and its code is available on GitHub, try it and contribute to the community with your experience. While politicians and experts are debating around encryption, the End-to-end encrypted database ZeroDB becomes open source and its code is available on GitHub. ZeroDB is an end-to-end encrypted database in […]
Recent Paris attacks have raised the debate around encryption, US authorities sustain that the encryption interferes with their investigation. Recent Paris attacks have raised the debate around encryption, law enforcement and intelligence agencies sustain that the encryption is defeating them to prevent terrorist activities. Of course the question is instrumentalized by politicians and media, at […]
Experts at enSilo have found a critical security vulnerability in various antivirus (AV) software that could be exploited by attackers to turn the AntiVirus to an attack-enabler tool. Some of the most important security firms have had an ugly surprise, the security software they offer to their clints have been compromised by a serious vulnerability flaw […]
The Britain’s National Crime Agency (NCA) has launched this week #CyberChoices campaign that targets parents of youngsters aged 12-15 to explain them how it is easy to be involved in cyber criminal activities. Are script kiddies a real threat? The Britain’s National Crime Agency (NCA) thinks so and launched a campaign to discourage teens from hacking activities […]
Two anomalous DDoS attacks have flooded the Internet root servers that received more than 5 million queries a second. Early last week, anomalous DDoS attacks have threatened the Internet root servers that received more than 5 million queries a second. “The authoritative name servers that serve the DNS root zone, commonly known as the “root servers”, […]