A new collection of documents disclosed by a new whistleblower and leaked online by The Intercept revealed new inconvenient truth on drone wars. Many USA government documents were leaked in the past years, Chelsea Manning, WikiLeaks, Edward Snowden showed the world that activists were behind. They are responsible for the disclosure of inconvenient truth. Governments […]
Security experts have discovered that thousands of websites running the eBay’s Magento e-commerce platform have been compromised and used to deliver malware. Security experts at Sucuri have discovered a malware campaign that targeted a large number of websites the eBay Magento e-commerce platform. The same campaign was also monitored by the researchers at Malwarebytes which focused their analysis […]
A young hacker violated the CIA Director’s personal email account and leaked sensitive files including a top-secret application for a security clearance. A high-school student claims to have hacked the personal email account of the CIA Director John Brennan. CIA and the US law enforcement agencies are investigating on the case. The teen told the New York […]
Good news, starting today, Facebook will notify you if they believe state-sponsored hackers are trying to compromise your account. Facebook announced a new initiative to protect its users from prying eyes, the popular social network will inform them on any suspected compromise from state-sponsored hackers. “Starting today, we will notify you if we believe your account […]
The Pen Test Partners researcher Ken Munro mapped and hacked connected iKettles across London demonstrating they leak WiFi passwords. The Pen Test Partners researcher Ken Munro has conducted a very singular experiment, he mapped and hacked connected kettles across London, demonstrating they leak WiFi passwords. Once again Internet of Things, this experiment demonstrates that poorly configured […]
A security analyst has demonstrated that WiFi Jamming, such as the Jamming of Bluetooth and Zigbee systems, is very easy and cheaper than ever. A security analyst has shown that Jamming Bluetooth, WiFi and Zigbee systems is not hard to perform but rather, above all, likewise not as expensive as one may think. As per […]
The German researcher Starbug, has demonstrated that it is possible to extract everyone’s smartphone PIN code from any selfie “image,” is biometrics secure? The German researcher Jan Krissler, aka Starbug, has demonstrated that it is possible to extract everyone’s smartphone PIN code from any selfie “image” … and much more! Jan Krissler is a popular hacker, he […]
The DARPA research agency is launching a new Program subbed ICARUS for the development of a new generation of Disappearing drones. I always follow DARPA because its innovative project, the last one that caught my attention is a new project on a new generation of unmanned aerial vehicles. The program is codenamed ICARUS (Inbound, Controlled, […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. The Dark web – Why the hidden part of the web is even more dangerous? Apple Kicks Out some Malicious Ad-Blocker Apps from its Online Store The Dow Jones […]
The prevalence and effectiveness of top exploit kits (Angler Exploit kit, Nuclear Exploit Kit) found to be very active in-the-wild. Why? The threat landscape today is one that grows in depth and sophistication on a daily basis; however, the prevalence and effectiveness of top exploit kits found to be very active in-the-wild cannot be denied. […]