Wristband and armband devices such as smartwatches and fitness trackers could be used by attackers to spy on you! We have discussed several times about the possibility to exploit IoT devices to spy on individuals. Lack of security by design and poor security settings could open the door to hackers. A Smartwatch or a fitness tracker […]
Liz Upton from the Raspberry Pi Foundation made a shocking revelation, someone has offered cash to install a malware into its tiny computers. The Raspberry Pi Foundation made a shocking revelation, someone has offered cash to install a malware into its tiny computers. Yes, the news is unbelievable, but Liz Upton, the Foundation’s director of communications, disclosed the […]
Microsoft declared war to Ad injection and âman-in-the-middleâ techniques implemented by both malware and legitimate programs including adware. Superfish adware was found already installed on new Lenovo portable PCs (laptops) earlier this year. The malware opens users to MITM (man in the middle) assaults in view of the way it infuses ads into web browsers. […]
Hyatt Hotels Corporation announced it recently discovered malware used to steal credit card data on its payment processing systems. The Hyatt Hotels Corporation is the last victim of cyber criminals using PoS malware. The company announced Wednesday that a malware has infected its payment systems. According to the official announcement issued by Hyatt the company is still […]
Security researchers from ESET uncovered the Roaming Tiger hacking campaign, bad actors in the wild are targeting Russian organizations. Roaming Tiger is the name of a cyber espionage campaign targeting high profile organizations in Russia and former Soviet Union countries, including Belarus, Kazakhstan, Kyrgyzstan, Tajikistan, Ukraine, and Uzbekistan. The Roaming Tiger campaign was discovered by experts at […]
A man from the Bahamas has been charged after allegedly hacking into the email accounts belonging to 130 celebrities stealing personal information, movie scripts and sex tapes. According to the U.S. Attorneyâs Office for the Southern District of New York , Alonzo Knowles, aka âJeff Moxey,â is a 23-year-old man suspected to have hacked into the email […]
Earlier this year experts at VoidSec discovered the Aethra botnet made up of 12000 Italian devices targeting businesses in various industries. Earlier February, experts at VoidSec where performing ordinary maintenance on their personal website when noticed something of strange in the logs. It was a “strange” recurring pattern, revealing a brute force attack against the […]
A honeypot set up by researchers at the SANS institute has shown that hackers  have already attempted to exploit the Juniper backdoor. Shortly after Juniper posted the advisory related to the presence of unauthorized code in the OS of some of its Firewalls, HD Moore, the developer of the Rapid7âČ Metasploit Framework, revealed that approximately 26,000 […]
The independent researcher  Indrajeet Bhuyan has demonstrated that is possible to crash the popular messaging app Whatsapp by sending crazy smileys. Crash our Friends’ WhatsApp could be quite easy, this is what the independent researcher Indrajeet Bhuyan has demonstrated by sending crazy smileys. Nearly 4000 simple Smileys are enough to crash our friends’ WhatsApp, the trick works on both […]
Who planted the Authentication Backdoor in the Juniper ScreenOS? Security experts are making their speculation, but interesting revelations are coming out. While the FBI is investigating the case searching for responsible for the introduction of a backdoor in a number of Juniper network devices, a number of speculation are circulating on the Internet.  Juniper Networks is a […]