ISIS supporters are spreading online a collection of tutorial titled the Book of Terror to teach how Hack a Wi-FI network and which are main spying tools. ISIS militants are spreading a small package, titled Book of Terror, containing data of various spy tools, as well as tutorials on how to hack Wi-Fi networks in […]
Security experts at Fortinet uncovered a new strain of the Vawtrak banking Trojan is implementing an obscuring mechanism based on the Tor2Web service. The authors of the banking Trojan Vawtrak are adopting a new tactic to hide the traffic to its servers,  they are exploiting  the Tor2Web service to masquerade malicious connections. In the past, criminal crews behind […]
Autonomous and connected vehicles, self-driving cars, are exposed to numerous cyber threats and the risk of hacking is concrete. After Security expert and hacker, Chris Roberts announced the possibility of hacking into aircrafts, more tension about the security of autonomous and connected vehicles has come to the fore. These cars are expected to be on […]
Crooks are using the NFC capability of Android smartphone to steal your credit card data, two researchers presented the PoC at the HITB. Crooks are using the NFC capability of Android smartphone to steal your credit card data, itâs scaring but true. But first letâs introduce the Near field communication (NFC) as “a set of […]
The hackers of the SEA, the Syrian Electronic Army, defaced the US Army website exploiting an Army’s commercial content delivery network provider. After a short period of silence, the group SEA and defaced the official website of the US Army and added a pop-up message displaying the following text: “Your commanders admit they are training the people they […]
After 4M records may have been stolen and Chinese hackers are the prime suspects, the US Govrecognizes the usefulness of the DHS EINSTEIN defense system. After 4 million records may have been stolen and Asia-based hackers are the prime suspects, the government recognizes the usefulness of the DHS EINSTEIN defense system. At this time, the […]
The owner of the Tox ransomware builder is offering for sale the platform worried by its popularity. He confirmed that he will pay ransoms to his customers. The owner of the famous Tox ransomware has decided that it was time to sell the platform, this after all popularity reached by its platform. The Tox platform […]
Malware researchers at Trend Micro have discovered a news strain of the malumPoS used to target hospitality, food and beverage, and retail industries. Security experts at Trend Micro have discovered a new strain of the MalumPoS malware that was reconfigured to compromise PoS systems based on the OracleÂź MICROSÂź platform. Trend Micro was the first […]
Security experts developed their PunkSPIDER, a Tor crawler, that already scanned more than 7000 domains and discovered numerous vulnerabilities. We have discussed several times about the Tor anonymizer network and the way it is exploited  by criminal crews to sell any kind of illegal product and service. Last week, an automated scanner dubbed PunkSPIDER was launched in the […]
A quick tour in the Black Markets, the places on the web where it is possible to acquire or rent âmaliciousâ services and illegal products. Black Markets are places on the web where it is possible to acquire or rent âmaliciousâ services and products, these markets are growing fast and are becoming very popular in […]