Mac malware could spy on users by piggybacking on webcam sessions started by legitimate applications such as FaceTime, Skype and Google Hangouts. Security experts are worried about the presence of a new Mac malware in the wild that attempt to record video via the built-in webcam. The principal problem for this family of spyware is […]
Which are principal cities hostages of malicious botnets? Symantec has tried to reply the difficult questions with an interesting study. It is not a mystery, there is a strict link between cybercrime and Geography. Cyber criminal organization used different tactics and offer different products depending on the country where they operate. Russian criminal communities specialize in […]
A few hours after the Reuters reported the existence of a surveillance tools used by Yahoo for email massive scanning, the Tech giant denied it. This week the Reuters reported Yahoo reportedly scanned all of its usersâ incoming emails with a secret software program that is designed to gather information for the US Government agencies. According to […]
A new variant of the Cerber ransomware kills common database-related processes like those of the MySQL, Oracle and Microsoft SQL servers to encrypt files. According to experts the BleepingComputer.com forum, a new variant of the Cerber ransomware is the wild attempts to shut down database connections to increase the effects of the infection. The principal goal […]
Once again an NSA contractor is the headlines for the alleged theft of secret exploit codes and highly confidential documents. The FBI has arrested another NSA contractor over a massive secret data theft. The US DoJ has charged Harold Thomas Martin (51) with theft of secret documents and highly classified government material. According to a court […]
The WiFox mobile app was designed as a huge container of network names and passwords for Wi-Fi airports networks worldwide. Do you travel a lot? Probably you have already read about WiFox, it is a legitimate Android/iOS mobile app that includes indications of thousands of airport Wi-Fi networks and their passwords. We have spoken several times about the […]
Hackers could use Insulin Pumps as weapons, this is not a sci-fi movie, but a disconcerting reality. The OneTouch Ping insulin pumps manufactured by Animas, a company owned by Johnson & Johnson, are affected by multiple several vulnerabilities that can be exploited by remote hackers to harm the diabetic patients who use them. While the security […]
Yahoo may have allowed US government to search user emails by using a secret software program that scanned hundreds of millions of Mail accounts. Yahoo is still in trouble, this time the company has reportedly scanned all of its users’ incoming emails with a secret software program that is designed to gather information for the US Government […]
Why Signal is considered the most secure instant messaging app? It stores only a few information about its users, and the events demonstrate it. Despite many of the most popular apps are implementing end-to-end encryption, not all applications are equal. Security experts recommend Signal for secure communications, in the aftermath of the DNC hack the staffers […]
You don’t need to pay in order to receive the full dump from the DropBox data breach, security researcher leaked it online. In August, a data dump containing more than 68 Million account credentials for online cloud storage platform Dropbox was leaked online. Dropbox forced password resets for a number of accounts after discovering the data […]