A flaw in certain D-Link switches can be exploited by remote attackers to access configuration data and hack corporate networks. The independent security researcher Varang Amin and the chief architect at Elastica’s Cloud Threat Labs Aditya Sood have discovered a vulnerability in the D-Link Switches belonging to the DGS-1210 Series Gigabit Smart Switches. The security experts revealed […]
An Israeli company named “L7 Defense” is trying to do the impossible – to stop application layer DDoS attacks in seconds instead of hours. It wants to do so by using an automatic protection system based on an immune-biological model that combines with Real Time Big Data analysis. “The body knows how to deal in […]
Microsoft recently fixed the a vulnerability in the Bitlocker disk encryption feature that could be exploited to easily bypassed it is a few seconds. A disk encryption tool is a very important software for the protection of our data, million machines rely on them to protect user data, but we have to consider that also […]
Hackers of the anti-Terrorism group Ghost Security Group have discovered ISIL militants had a bitcoin address containing 3 Million Dollars. We have been dismayed by the recent Paris attacks, fear, disgust and anger are the emotions that many of us have felt seeing the images from the France. While the Islamic State (ISIS) was claiming the […]
The ISIS, exactly as any other government, has adopted measures to control the access to the Internet in the territories occupied. In these hours we are discussing the tragic Paris attacks, we are trying to collect the greatest amount of information as possible about the organization of the ISIS. How does the ISIS conduct its propaganda? […]
The popular security expert Scot Terban (aka @krypt3ia ) discovered a few hours after the Paris attacks, a new ISIS propaganda hub appeared on the Darknet. The Paris attacks shocked the world, the war is overwhelmingly coming into our homes and the intelligence experts fear that this is just the beginning. The ISIS knows how to […]
Twittor is a tool open source that was designed by the London-based researchers Paul Amar to control botnets via Direct Messages. Twittor is a tool open source that was designed by the London-based researchers Paul Amar to control botnets via Direct Messages. The expert has developed the Twittor tool to make life easier for botnet masters, allowing them to control their […]
Anonymous launched the #OpParis to track terrorists online. We are Anonymous. We are Legion. We do not forget. We do not forgive. Expect us! Last Friday was a sad day for the humanity, 129 innocent people were killed in the Paris attacks managed by members of the ISIS. Every event has consequences in the cyber […]
Rumors circulating on the Internet sustain that terrorists behind the Paris attacks have used PlayStation 4 for their communications. The Paris attacks have shocked the world, the ruthless terrorists of the ISIS killed defenseless people. The days after atrocity law enforcement are conducting an investigation on a large range to identify the logistic base of the […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Malvertising attack hit The Economist, anti-ad blocking service PageFair hacked Threat actors hacked the popular Touchnote company Cyber Caliphate Hacks 54k Twitter accounts, including ones of CIA and FBI […]