Shedun Trojanized adware family implements the ability to automatically install any app on the devices by exploiting the Android Accessibility Service. Android is once again in the storm, threat actors can install any malicious third-party app on mobile devices remotely even if the users explicitly refuse it. Security experts at mobile security firm Lookout have […]
Evaluation of DHS Information Security Program for Fiscal Year 2015 revealed the existence of dozens of top-secret unpatched databases. The story I’m about to tell you is staggering, the US Department of Homeland Security is running dozens of unpatched and vulnerable databases, a number of them contained information rated as “secret” and even “top secret.” The discovery emerged […]
After 3.5 years, Fyodor has released the new version of the popular open-source network-exploration tool Nmap 7. After 3.5 years, Fyodor has released the new version of the popular network-exploration tool Nmap 7. Nmap is one of the most popular open-source network mapper, the principal changes announced for this release are: – 3,200 code commits since Nmap […]
In the wake of Paris attacks Anonymous continues its campaign against the ISIS and announced to have taken down 20,000 pro-ISIS Twitter accounts. In the wake of Paris attacks the hacking collective Anonymous launched its offensive against the ISIS with the intent to interfere with the online propaganda and reveal the identity of its members. The #OpParis follows […]
The Zerodium (Zero-day broker) company has published a price list for various classes of software targets and digital intrusion methods. In an exceptional move on 18th of Nov (Wednesday), the Zerodium (Zero-day broker) published a price list for various classes of software targets and digital intrusion methods that is purchased from cyber criminals and resells to consumers […]
The SilverPush technology allows advertising firm to track user habits with near-ultrasonic sounds.How does it work? A few days ago, the Center for Democracy and Technology (CDT) warned that the Indian company SilverPush has developed a technology that allows adverts to ping inaudible commands to mobile devices. SilverPush has issued also an SDK that could […]
Which are the technological tools used by the ISIS? Do the terrorists know how to avoid the surveillance online? The ISIS guide has the replies to these questions. In the wake of Paris attacks, intelligence agencies and law enforcement have raised again the debate about the encryption requesting IT giants to support them by introducing backdoors in their products. But […]
A Brazilian security researcher has discovered a nested backdoor affecting nearly 600,000 Arris cable modems. Arris is working to fix it. The Security expert Bernardo Rodrigues (@bernardomr)Â has discovered the presence of a “backdoor-within-a-backdoor” in roughly 600,000 Arris cable modems. Rodrigues is a vulnerability tester at Brazil’s Globo television network, he reported the undocumented library in […]
According to a draft document seen by the Reuters the EU plans to ban bitcoin and any form of anonymous payment online to curb terrorism funding. European Union countries are planning to ban virtual currencies and any form of anonymous payments online, even through pre-paid cards. According to a draft document seen by journalists at […]
The hacking group that behind the Dark Seoul Operation that hit entities in South Korea in 2013 may be back with new targets. According to the experts at Palo Alto Networks, the hacking group behind the attacks that targeted banks, financial institutions, government websites and news agencies in South Korea is still active. The attacks […]