Altcoin cloud mining hash power online marketplace ScryptCC has been hacked and a large amount of Bitcoin was stolen by the attacker. The news of another clamorous case of Bitcoin theft is circulating on the Internet, Altcoin cloud mining hash power online marketplace ScryptCC has been hacked. In time I’m writing it is not known […]
Privacy advocates claim snooping component was activated within Chromium, potentially exposing private conversations. Privacy advocates are accusing Google. Privacy advocates and open source developers claim over the secret installing of Google software which is capable of listening in on conversations held in the surrounding environment. It seems that the listening component was involuntarily activated within […]
Between April 2014 and June 2015, the IC3 received 992 CryptoWall related complaints, with victims reporting losses totaling over $18 million. Cryptowall is one of the most nefarious ransomware in the wild, in twelve months the FBI has estimated that the overall losses were more than $18 million. Ransomware implements a classic extortion scheme typically demanding that victims pay ransom […]
The NIST has published a document for protecting Controlled Unclassified Information (CUI) when it resides on contractors IT infrastructures. The National Institute of Standards and Technology (NIST) has published a guideline, titled “Publication Citation: Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations“, for protecting Controlled Unclassified Information (CUI) when it resides on contractor IT […]
Adobe has released a security update for the critical Adobe Flash Player vulnerability CVE-2015-3113 that is being actively exploited in the wild. Security experts at FireEye discovered a critical heap buffer overflow vulnerability, coded CVE-2015-3113, that affects Adobe systems. FireEye discovered that the Adobe flaw is being exploited in the wild by the hacking crew […]
Security expert Dustin Childs publicly disclosed a Microsoft IE exploit that affects only 32-bit IE platforms which are currently used by millions of users. The HP security expert Dustin Childs publicly disclosed a Microsoft IE exploit based on a flaw that resides in the Address Space Layout Randomisation (ASLR). The ASLR is a security feature implemented […]
A security researcher is trying to harvest information about Tor sites that propose illegal products, and in some cases he even discovered their address. The Dark Web is known to be “the place” for sites where it can be found drugs, child pornography, weapons, because these websites can live on without disclosing the server location […]
What is the Dark Web? Unveiling the myth of the Dark Web and making sure that people understand its magnitude and its limitations. Letâs begin by explaining what the so called âDark Webâ actually is. This is a term used to describe a collection of websites that may be publicly visible, but they hide information […]
Documents leaked by Edward Snowden show the NSA and the GCHQ efforts to compromise security software companies including Kaspersky Lab.  A new collection of documents leaked by the popular whistleblower Edward Snowden reveals that both UK and US government intelligence agencies are targeting principal security firms and security companies. Kaspersky Lab calls nation-states’ targeting of security companies […]
The popular hacker Kevin Mitnick explains how it is easy to steal data from a network tapping the cable, even if it’s a fiber optic network. Kevin Mitnick demonstrates how easy it is for a hacker to tap into your network and read your email messages, even if it’s a fiber optic network. Kevin Mitnick […]