Charlie Miller and Chris Valasek, the famous car hackers who recently demonstrated that some Fiat Chrysler cars can be remotely hijacked, have been hired by ridesharing giant Uber. The popular hackers Charlie Miller and Chris Valasek who recently hackers a Fiat connected car have announced that they have been hired by the Uber Company. Miller and Valasek […]
PaloAlto and with WeipTech have identified 92 samples of a new iOS malware family in the wild dubbed KeyRaider that compromised over 225,000 Apple accounts. Palo Alto networks announced recently that a new iOS malware called KeyRaider allowed crooks to take over more than 225.000 apple accounts on jailbroken iOS devices. KeyRaider allows the attackers […]
Corebot is a new data stealer discovered by the experts at IBM Security X-Force while they were analyzing some endpoints protected by their solutions. Corebot is the name of a new data stealer malware discovered by the experts at IBM Security X-Force while they were analyzing some endpoints protected by their product, the Trusteer Apex […]
This post explains how to use the PowerMemory script to reveal the passwords used by users of the computers running under Windows systems. Disclaimer Any actions and or activities related to the material contained within this blog is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against […]
The jihadist hacker Junaid Hussain was killed this week in a US targeted air strike in Syria. The man was actively recruiting ISIS sympathizers. A spokesman for the US Central Command, Colonel Patrick Ryder, confirmed that the jihadist hacker Junaid Hussain was killed in a targeted air strike on August 24 in Raqqa, Syria. Colonel […]
Six British teenagers have been arrested on suspicion of attacking websites by using the Lizard Squad’s DDoS tool, the Lizard Stresser. Lizard Squad is the popular hacking crew that brought the online gaming networks Sony PlayStation Network and Microsoft Xbox Live with major Distributed Denial-of-Service (DDoS) attacks. The hackers developed a tool dubbed Lizard Stresser that draws on Internet […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Who are the Ashley Madison users? Hacking the Iridium network could be very easy Amazon to trash Flash, as browsers walk away Keyless Cars: A New Frontier For Bug […]
The experts at EFF organization speculate that Russian State-sponsored hackers belonging the APT 28 group have managed the last EFF Spear phishing Scam. Attackers, alleged to belong to a Russian state-sponsored APT registered a bogus Electronic Frontier Foundation domain earlier this month. The hackers used the name brand of popular privacy watchdog in an attempt to trick […]
According to a report published by the Citizen Lab Iranian hackers have elaborated a sophisticated phishing scheme to takeover Gmail accounts. According to a report published by the Citizen Lab at the University of Toronto’s Munk School of Global Affairs, Iranian hackers have elaborated a sophisticated phishing scheme to circumvent security measures that defend Gmail […]
Employees are the greatest security risks, especially since they are prone to be used as pawns for hackers. That’s why they are vulnerable to attacks. Mobile technology has changed the landscape of business these days. It has enabled employees to set up virtual offices, have more work flexibility, and even extend working on their own […]