Anonymous affiliate GhostSec has supported US law enforcement and Intelligence agencies in thwarting Isis terror plots in New York and Tunisia. The popular Anonymous affiliate GhostSec has provided useful information on preventing terrorist attacks on New York and Tunisia planned by the Islamic State (Isis), according to a counterterrorism expert. According to the Internation Business Times, Michael Smith, an adviser to […]
A group of six academics has developed Hornet, a new high-speed anonymity network that promises to be a valid alternative to the popular Tor network. Hornet allows for anonymous web surfing protecting the user’s privacy. The principal advantage HORNET has respect other anonymizing networks like Tor, is the speed. The Hornet is able to manage anonymous traffic […]
Fiat Chrysler has recalled 1.4 million vehicles following security researchers hacked a Jeep Cherokee remotely by exploiting a vulnerability in its systems. One of the arguments most debated in the hacking and security community this week is the recent hack of a Fiat Chrysler Jeep. The security experts Chris Valasek and Charlie Miller have demonstrated […]
Anonymous hackers announced to have compromised the US Census Bureau against TTIP/TPP and leaked data online as proof of the data breach. Anonymous hackers announced to have compromised the US Census Bureau against TTIP/TPP. The members of the popular collective are the same that hacked World Trade Center (WTC) according to the colleagues at the Hackread.com. The […]
Kaspersky’s researchers warned LinkedIn about a security flaw that could put at risk their 360 million users and exposing them to spear phishing attacks. In November 2014, Kaspersky’s researchers warned LinkedIn about a security flaw that could put at risk their 360 million users. This was a big concern at the time because LinkedIn has […]
The HP Zero Day Initiative has disclosed four new zero-day vulnerabilities in Internet Explorer that can be exploited by attackers to remotely execute code. The HPâs Zero Day Initiative has disclosed four new zero-day vulnerabilities in Internet Explorer that can be exploited by attackers to remotely execute code. The four zero-day flaws affect different components of the browser […]
Netragard has shut down its exploit acquisition program, as a result of the clamorous data breach that the Italian firm HackingTeam has suffered. In this article we will go through an issue with a company that buys and sells exploits (Netragard) and the steps it was forced to take since one of their clients was […]
A new critical vulnerability was discovered in the widely used OpenSSH software, hackers exploiting this flaw can run brute-force attacks against servers. A new critical vulnerability was discovered in the widely used OpenSSH software, hackers exploiting this flaw can run brute-force attacks against server performing thousands of authentication requests remotely.  The vulnerability affects the latest version […]
Android devices, from Ice Cream version to Jelly Bean were p0wned with RCSAndroid RAT, one of the most professionally developed and sophisticated malware. Since the leak of Hacking Team hack, every day in security area have been inundated with news about some vulnerability, exploit, etc. etc., and still more news are yet to come out. […]
Researchers have discovered a critical local privilege escalation (LPE) vulnerability in the Mac OS X operating system, but Apple will fix only by October. German researcher Stefan Esser, founder of security audit company SektionEins, has discovered a local privilege escalation (LPE) vulnerability in the Mac OS X operating system that affects OS X 10.10.x. Esser decided to […]