In Israel there is an advanced cyber security industry, based mostly on veterans from two intelligence units, the cyber labor market is a new guild. Cyber technology could be a catalyst to equality in the labor market. Its power is seeded in the ability of everyone to gain skills without social entry barriers. To succeed […]
The Google Project Zero hacker  James Forshaw assessed Windows 10 analyzing the big risks related with the new OS from Microsoft. James Forshaw, a member of the Google Project Zero hacking crew, was given the task to asses Windows 10, and see if there were big risks related with the new OS from Microsoft. Forshaw talked […]
Cyber Security Expert Mikko Hyppönen worries about cyber terrorists belonging to the Islamic State (ISIL or ISIS) have a credible offensive cyber capability The popular Cyber security expert Mikko Hyppönen,  Chief Research Officer for F-Secure, said he worries about cyber extremists that could penetrate critical infrastructure and cause serious damages. The expert explained that the ISIS is probably […]
Nearly 18,000 Android apps built using the Taomike SDK, and used in China, have been found to include a malicious SMS stealing library. Bad news for Android users, according to according to Palo Alto Networks, nearly 18,000 Android Applications built using the Taomike SDK have been found to include SMS Stealing Library. The Taomike SDK is one […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. The Rapid Increase in the Sophistication of Exploit Kits The number of Governments using the FinFisher Spyware is increased DARPA is working on ICARUS, the disappearing delivery drone Big […]
A hacker belonging to the alleged group LulzSec has claimed responsibility for a DDoS attack that hit UK telecom TalkTalk this week, but … I’m following the events related to the data breach suffered by the TalkTalk company, this week the British company has publicly disclosed that four million subscribers  have been impacted by a âsustained […]
Researchers demonstrated how disable the airbags on a Audi TT (and others models) and other functions by exploiting a zero-day flaw in third-party software. Lately, many researchers proved that car manufacturers havenât addressed security vulnerabilities in modern vehicles properly and use of lots of embedded controllers and providing different external interfaces made it possible to […]
The German authorities have launched a probe into allegations of a new case of US espionage after they have found a laptop infected by the Regin Spyware. The German authorities have launched a probe into allegations of a new cyber-espionage campaign that is suspected to be linked to the US intelligence. The news was revealed […]
Hackers that recently breached the systems at TalkTalk IPS have stolen ‘incomplete’ customer bank data, states an official announcement issued by the firm. This week the TalkTalk Telecom Group plc has publicly disclosed that four million subscribers  have been impacted by a âsustained cyberattackâ that hit its servers. On Friday, the TalkTalk CEO Dido Harding confirmed personally […]
How much cost a zero-day for an industrial control system? Where is to possible to buy them and who are the main buyers of these commodities? We have discussed several times about the importance of zero-day in cyber attacks against computer systems, the exploitation of previously unknown vulnerabilities is a prerogative of well-funded hacking groups such as state-sponsored crews. […]