The popular security expert Brian Krebs has reviewed a dating scam package offered in the underground by Russians fraudsters. Russians fraudsters have automated the sale of plug-and-play online dating scam packages. As usual happens in these cases, these services are offered on underground websites specialised in online frauds,  crooks promise a response rate of 1.2 percent […]
The Prox Dynamicsâ PD-100 Black Hornet 2 is a tiny drone having the dimension of a flying insect and a lot of advanced features. Drones are privileged instruments of surveillance, we read about vehicles equipped with IR cameras or devices to spy on mobile devices. These vehicles are used by armies, intelligence and law enforcement agencies during their […]
Samsung Electronics has GAIA, a powerful and comprehensive three-layer security solution for protection of Tizen-based Smart TVs. Security experts have no doubts, IoT devices will be a privileged target for hackers, for this reason, security firm are designing solutions to mitigate cyber attacks against connected smart objects.Samsung is one of the company that is more […]
The Sony PlayStation Network is down, it is the first major issue suffered on a global scale in 2016.  Sony acknowledges the problems. The PlayStation Network is down worldwide. I’m just back home trying to play with my son when I had the ugly surprise. It is the first massive outage of the year, I searched […]
A second misconfigured database has been discovered by Chris Vickery containing data of US voters, including 19 million profiles with private information on religion, gun ownership and more. A couple of weeks ago Salted Hash reported on a sensational discovery made by the security expert Chris Vickery who found a misconfigured archive containing the personal […]
After many years, Microsoft admitted that Chinese authorities hacked thousands of Hotmail accounts, belonging to Chinaâs Tibetan and Uighur minorities. After many years, Microsoft finally concluded that Chinese authorities indeed hacked thousands of Hotmail accounts, belonging to Chinaâs Tibetan and Uyghur minorities, but at the time did not warn the users, allowing the victims to […]
Security experts at ESET firm provided details of the new campaign based on the BlackEnergy Trojan that targeted Ukrainian news media and electric industry in 2015. A new wave of malware-based attacks is targeting media outlets and energy companies in Ukraines, the attackers rely on malicious code that is able to wipe hard drives of […]
According to data provided by the CVE Details Apple Mac OS X is the software with the highest number of vulnerabilities in 2015. Which is the software with the greatest number of publicly disclosed vulnerabilities in 2015? You will be surprised to know that the software with the major number of vulnerabilities is the Apple […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs InterApp, the device that can hack any Smartphone European credit card payment terminals are plagued with serious flaws The Ramnit Botnet is back after the law enforcement takedown Darkweb, a look back at 2015 events and 2016 […]
Alleged Turkish hackers have taken over the Russian Communications and Mass Media Minister Nikolai Nikiforovâs Instagram account. Events in the cyberspace are strictly correlated with facts in the real life, in many cases, disputes between countries are associated with numerous cyber events that could be analyzed by intelligence analysts. The recent crisis in Crimea between Russia and Ukraine is just […]