New revelations came after a high-profile defector warns of that North Koreaâs cyber army has the capability to run cyber attacks that could cause loss of human lives. According to an exclusive report by Reuters, The US was attempting without success to interfere with the nuclear programme of Pyongyang, in the same way it has done with Iran … SCADA systems […]
The cyber security expert Michael Fratello has made a detailed analysis of the locker ransomware that implements a unique delivery mechanism On May 25th, 2015, a wave of reports came flooding in from users around the globe, claiming that their computers have become compromised. Messages from users looking for help began appearing on forums such […]
A High-profile defector warns of that North Korea’s cyber army has the capability to run cyber attacks that could cause loss of human lives. Digital life and real existence increasingly overlap, cyber weapons are proof of that a threat originating from cyberspace can cause real and tangible damage as the loss of human lives. The BBC published […]
The Conservatives are planning new laws to give MI5 the power to force IT giants to hand over encrypted messages from terror suspects. Potential global terrorism threats are persuading to Conservatives in UK to move the pieces of chess by law; in advance of the worldâs biggest internet companies, such as Google, Apple and Facebook […]
Stegosploit is the technique developed by the security researcher Saumil Shah that allows an attacker to embed executable JavaScript code within an image. The security researcher Saumil Shah from Net Square security has presented at Hack In The Box conference in Amsterdam his Stegosploit project which allows an attacker to embed executable JavaScript code within an […]
The authors of the popular Angler exploit kit integrated an exploit for a Flash Player flaw fixed by Adobe just a couple of weeks ago. The creators of the popular Angler exploit KIT are known for being quick in integrating and exploiting zero-day vulnerabilities, this time they added an exploit related with the Flash player, […]
A Pakistani hacker claimed responsibility for a data breach at Gaana music streaming service that exposed data of  more than 10 Million registered users. Gaana (Gaana.com), one of the most popular music streaming service in India has reportedly been hacked. Gaana service has more than 10 Million registered users and 7.5 Million monthly visitors, according to various sources available on […]
Security researchers at Trend Micro Security firm discovered that 1 in 20 Android apps open to attack due to a flaw in the Apache Cordova API Framework. Researchers at Trend Micro have discovered a serious vulnerability (CVE-2015-1835) in the Apache Cordova mobile API framework, that could be exploited by remotely by attackers to modify the behavior […]
According to a senior fellow for Lockheed IT, the National Security Agency has tested the use of smartphone-swipe recognition technology dubbed Mandrake. The NSA has developed a new technology, dubbed “Mandrake“, that can identify users from the way they swipe strokes and text on a smartphone screen. The news was reported by officials with Lockheed […]
SAP Security experts discovered a number of unpatched vulnerabilities and weaknesses in Oracle PeopleSoft that could be exploited to obtain admin passwords. The SAP security experts, Alexander Polyakov and Alexey Tyurin, revealed that Oracle PeopleSoft contains unpatched vulnerabilities and weaknesses that could be exploited by attackers to obtain admin passwords. The impact of such vulnerabilities […]