A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs FBI investigates on Juniper hack, is it a nation-state attack? Phone House â Personal data of 12+ million Dutch mobile customers open to hackers Phantom Squad plans to hack PSN and Xbox, SkidNP hacks its website Hillary […]
The security expert Chris Vickery has discovered a misconfigured archive exposes the personal details of 191 million U.S. voters. A misconfigured database is the root cause of the exposure of around 191 Million voter records. The records include voters’ full names, unique voter IDs, unique voter IDs, date of births and phone numbers. The database […]
Which are the main events observed in the darkweb during the 2015 and what to expect in the next 12 months? The DarkWeb is a set of publicly accessible content that are hosted on websites whose IP address is hidden, but to which anyone can access it as long as it knows the address. The […]
The Ramnit botnet that has been disrupted by European law enforcement in February is back and itâs targeting online banking worldwide. Security researchers at IBM Security have discovered a new variant of the popular Ramnit Trojan. This year law enforcement agencies from several European countries coordinated by the Europol have taken over the botnet composed […]
Two German security experts have exposed a number of serious flaws in credit card payment systems that put users at risk. The duo of German security experts, Karsten Nohl  and Fabian Braunlein, found a new vulnerability in payment terminals that could be exploited by hackers to steal money. Differently from past attacks, this time, the hackers […]
The Tel Aviv-based Rayzone Group is offering for sale a gadget called InterApp that can intercept and exfiltrate information from nearby smartphones. InterApp is a device designed by the Israeli Rayzone Group that can spy on any smartphone. “InterApp system enables to get intimate information of any phone user, which is in the systemâs ,proximity. The collected […]
About the Zero knowledge proof and the ability to proof capability to attack or to defence implementing the cyber deterrence. Successful deterrence based on three aspects – Capability, Threatening message and Transmitting the message to the opponent. Therefore, One of the critical issues in cyber deterrence is the ability to proof your capability to attack […]
Fabian Wosar, security researcher at Emsisoft, created a tool for decrypting files locked by the Gomasom Ransomware. Ransomware are the most threatening cyber threats for end-users, but today I have a good news for victims of the Gomasom ransomware, victims can rescue their locked files. The news was spread by the security researcher Fabian Wosar that developed a […]
As a result of a configuration change a security issue allowed some Steam users to randomly see pages generated for other users for a period of less than an hour. Bad news for the popular community of Steam gamers, some of the users are facing serious security issues. Several users online reported to be able to […]
The Phantom Squad started the attacks on the PlayStation Network and the EA (Electronic Arts) as announced a few days ago. Last year hackers belonging to the hacking group of the Lizard Squad tool down at Christmas the online networks of both Microsoft Xbox Live and PlayStation network (PSN) highlighting security issues affecting the services of Sony […]