The ISIS, exactly as any other government, has adopted measures to control the access to the Internet in the territories occupied. In these hours we are discussing the tragic Paris attacks, we are trying to collect the greatest amount of information as possible about the organization of the ISIS. How does the ISIS conduct its propaganda? […]
The popular security expert Scot Terban (aka @krypt3ia ) discovered a few hours after the Paris attacks, a new ISIS propaganda hub appeared on the Darknet. The Paris attacks shocked the world, the war is overwhelmingly coming into our homes and the intelligence experts fear that this is just the beginning. The ISIS knows how to […]
Twittor is a tool open source that was designed by the London-based researchers Paul Amar to control botnets via Direct Messages. Twittor is a tool open source that was designed by the London-based researchers Paul Amar to control botnets via Direct Messages. The expert has developed the Twittor tool to make life easier for botnet masters, allowing them to control their […]
Anonymous launched the #OpParis to track terrorists online. We are Anonymous. We are Legion. We do not forget. We do not forgive. Expect us! Last Friday was a sad day for the humanity, 129 innocent people were killed in the Paris attacks managed by members of the ISIS. Every event has consequences in the cyber […]
Rumors circulating on the Internet sustain that terrorists behind the Paris attacks have used PlayStation 4 for their communications. The Paris attacks have shocked the world, the ruthless terrorists of the ISIS killed defenseless people. The days after atrocity law enforcement are conducting an investigation on a large range to identify the logistic base of the […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Malvertising attack hit The Economist, anti-ad blocking service PageFair hacked Threat actors hacked the popular Touchnote company Cyber Caliphate Hacks 54k Twitter accounts, including ones of CIA and FBI […]
A Russian manufacturer has built an advanced system for the protection of any channels of telephone communication against wiretapping. The Russian Government has a new system for the protection of communication channels against the wiretapping, the news was disclosed by the director general of the Interstate Corporation of Development (ICD), Ivan Polyakov, and it was reported by […]
A security loophole in the official Gmail Android app opens the email spoofing attacks allowing anyone to change the sender email name. The independent security researcher Yan Zhu has discovered a serious security issue in the Gmail Android app allows ill-intentioned to send an email pretending to be someone else. Clearly a similar loophole could represent a […]
Experts at BitDefender have discovered a Cryptolocker/Cryptowall Ransomware Kit offered for sale at $3,000, source code included. Yesterday I wrote about a new Ransomware-as-a-service, the FAKBEN, surfaced from the criminal underground, requesting customers 10 percent profit cut. In the previous days I reported other cases involving ransomware, such as a malicious code that infected the UK […]
At the MobilePwn2Own, a Chinese expert has demonstrated how to hijack an Android smartphone by exploiting a zero-day flaw in the Chrome browser. The Chinese expert Guang Gong from Qihoo 360 has demonstrated how to hijack an Android smartphone by exploiting a flaw in the Chrome browser. The researcher demonstrated the hack at the MobilePwn2Own at the […]