The permanent movement of trajectories on cyberpolitics is transforming political discourse. Last 29th of September, cybernauts worldwide received a simple twitter from Edward Snowden titled “Can you hear me now?”. It was a cyber experiment with a total of 170 000 followers, by shared 25000 times during an hour. This simple demonstration on cyberpolitics may […]
The Dridex Banking Malware is risen, security experts at Palo Alto intelligence discovered a still ongoing large phishing campaign. Once against the Dridex banking Trojan is in the headlines, this week security experts at Palo Alto intelligence discovered a still ongoing large phishing campaign. The phishing campaign is targeting victims mainly in the UK, the malicious messages […]
A new strain of malware identified by Symantec as the Vigilante malware, aka Wifatch, has infected tens of thousands of IoT devices across the world. Who is infecting thousands of IoT devices across the world, and why? A new strain of malware, identified by Symantec as Linux.Wifatch has infected tens of thousands of IoT devices across the […]
Sanmay Ved was searching for available .com domains and discovered the availability of Google.com … then he bought it, but something happened … This story is amazing and difficult to believe …. an individual managed to buy the Google.com domain and now I’ll tell you how. The guy is Sanmay Ved, a former Google employee that currently works for Amazon. […]
Patrick Wardle, director of research at Synack has already demonstrated another method, called Apple dylib hijacking, to bypass Apple GateKeeper. Since the introduction of the Apple Gatekeeper by MAC OSX, many researchers have focused their attention in trying to find flaws affecting it due to bypass Apple security and gain control of a device. Patrick […]
The security researcher Mohammad Reza Espargham a new zero-day flaw is threatening million of users of the latest version of WinRAR. Yesterday I reported the news of two critical vulnerabilities that affect the popular TrueCryptTrueCrypt application and the related risks for the users, today a new zero-day flaw is threatening million of users of the latest […]
The US Air Force is using a modified EC-130 Compass Call aircraft to demonstrate how to hack into enemy networks. Information warfare is overlapping traditional military domains, in order to conduct a fight in the air it is possible to used new hacking techniques as the US Air Force demonstrated. According to the Maj. Gen. […]
Security experts at Kaspersky have observed an increase in the activity of the group of hackers politically motivated known as Gaza cybergang. A group of hackers known as âGaza cybergangâ and âGaza Hackers Teamâ has been targeting IT and Incident Response Team in the Mena (Middle East North Africa) area. The Gaza cybergang appears to be […]
Check out the hacking tools used by Mr. Robot and see why the display of these tools is as realistic as possible. Mr. Robot has been the breakthrough of summer for series lovers, especially for those who are fans of technology and computing. One of the major advantages of Mr. Robot over other series has […]
The popular security expert James Forshaw has discovered two critical flaws in the driver that TrueCrypt installs on Windows systems. Bad news for Windows users who have decided to use TrueCrypt to encrypt their hard drives, the researcher James Forshaw, a member of Google’s Project Zero team, has discovered two serious vulnerabilities affecting the popular […]