The Britain’s National Crime Agency (NCA) has launched this week #CyberChoices campaign that targets parents of youngsters aged 12-15 to explain them how it is easy to be involved in cyber criminal activities. Are script kiddies a real threat? The Britain’s National Crime Agency (NCA) thinks so and launched a campaign to discourage teens from hacking activities […]
Two anomalous DDoS attacks have flooded the Internet root servers that received more than 5 million queries a second. Early last week, anomalous DDoS attacks have threatened the Internet root servers that received more than 5 million queries a second. “The authoritative name servers that serve the DNS root zone, commonly known as the âroot serversâ, […]
Microsoft has issued an advisory to notify customers that the private keys for an SSL/TLS digital certificate for *xboxlive.com have been disclosed. According to a security advisory published by Microsoft, the company is propagating a new certificate for the *.xboxlive.com domain because it has âinadvertently disclosedâ the certificate’s contents. Microsoft confirmed the accidental disclosure of the […]
According to a new report published by Trend Micro, the North American cyber criminal underground is very easy to access. The new report released by Trend Micro reveals that the cyber criminal underground market in North America isnât so hidden like in other countries. “It doesn’t exist in the dark web as much as other […]
While media announced to have found the real identity of the Bitcoin creator Satoshi Nakamoto, Australian police raided his home in Sidney. A few hours after the media indicated the Australian expert Craig Steven Wright as the possible man behind the popular name Satoshi Nakamoto, the anonymous creator of Bitcoin, the Australian Police raided his home in Sydney. […]
EU member states and lawmakers have prepared a first draft of the EU regulation in cyber security that will force companies to improve security and report security breaches and cyber incidents. EU member states plan to impose rules in the company to prevent cyber attacks, on Monday they agreed the first draft of the regulation […]
Symantec has uncovered Cadelle and Chafer groups, two Iran-based hacking teams that are tracking dissidents and activists. According to a new report published by Symantec. Iranian hackers have been using malware to track individuals, including Iranian activists and dissidents. The researchers have identified two groups of Iran-based hackers, dubbed Cadelle and Chafer, which were distributing data stealer malware […]
Hashcat, the popular password recovery tool has been released as open source under the MIT license. You can contribute to it. The popular password cracking tool Hashcat is not an open source software, the announcement was first made on December 4 on Twitter via an MD5 hash that posted  the following message: âhashcat open sourceâ @hashcat […]
According to an advisory published by the KoreLogic firm the Linksys EA6100-6300 wireless routers are vulnerable to attacks due to flawed CGI scripts. Once again IoT devices are in the headlines, once again SOHO routers are affected by a security vulnerability that opens users to cyber attacks. According to the KoreLogic firm, the flawed devices […]
Nemesis is a new strain of malware, very hard to detect and remove, designed to steal payment card data and implementing bootkit functionalities. Experts at FireEye have discovered a new strain of malware designed to steal payment card data. Nothing new, you are probably saying, but this malware dubbed Nemesis is very difficult to detect […]