Several US schools are using social media monitoring platform to watch students and their online activities in order to prevent risky situations. A number of US schools are using social media monitoring software to watch students and their online activities. According to the news website Click Orlando, the institutes have bought access to sophisticated social media monitoring […]
The eight-character string “http://:” brings Skype into Endless Crash Loop, and once theyâre in the user’s chat history, the app canât start again. A few days ago we discussed about a problem occurred to iPhone and iPad users, their mobile devices were crashing after the reception of a specifically crafted text message, now a similar problem […]
Security experts Ben Cox explained that the official Github repositories of the UK Government, Spotify, and Python were accessed using compromised SSH keys. Ben Cox, engineer at CloudFlare revealed that the official Github repositories of the UK Government, Spotify, and Python were accessed by using legitimate SSH keys. It seems that the keys were compromised […]
“Torus” a name that may seem insignificant to many, but that instead revealed a huge expansion in surveillance of FiveEyes alliance. The researcher Duncan Campbell analyzed a document leaked by the NSA whistleblower Edward Snowden focusing his investigation on the a term used in the secret slides that could have revealed a massive increase in the […]
The Data âcrown jewelsâ on global Cyber Risk: New scenarios of Cyber-politics to debate on surveillance versus privacy After two-year, stop-and-go legislative effort on the controversy of section 215 of the Patriot Act, the American Senate voted in plenary 77-to-17 on Sunday-night to move a House bill forward to object political conflict on surveillance vs. […]
ThreatConnect has conducted further investigations on the Rombertik malware and traced a malicious sample they analyzed to a Nigeria-based man. Lately Rombertik have been making the headlines of security related news, I wrote on SecurityAffairs about the malware a few weeks ago, last update from security researchers at ThreatConnect is that a new analysis traced […]
Security experts discovered a new njRat campaign using old tactics, making use of compromised websites as a third layer, communication proxy. A recent post published on http://blog.0x3a.com/ it was described a new njRat campaign using old tactics, making use of compromised websites as a third layer, communication proxy. Using FakeAV tactics was in vogue some years […]
Facebook users can add PGP keys to their profiles in order to receive “end-to-end” encrypted notification emails sent from Facebook. On June 1, 2015, Facebook announced a new security feature to enhance the privacy of notification email content. Now, Facebook users are able to add PGP keys to their profiles in order to receive “end-to-end” […]
The German Government confirmed that hackers that attacked the Bundestag two weeks ago have had access to data of the German Parliament. The German Government has confirmed that hackers who breached the Bundestag systems a couple of weeks ago have also stolen data from targeted network. A spokeswoman for the Bundestag, Germany’s parliament, confirmed that unknown […]
A security researcher discovered a zero-day vulnerability in many Mac firmware that could allow an easy installation of an EFI rootkits. The cyber security expert Pedro Vilaça has discovered a low-level zero-day vulnerability in Apple Mac systems that could be exploited by privileged users to more install an EFI rootkits. Vilaça explained that the attack is […]