Intel Security published an a curious study to test consumer knowledge about phishing practice and measure the ability to detect phishing emails. For this study, Intel Security presented 10 emails where people were asked to identify which emails were phishing with the purpose of steal personal data, and which were legit, legal emails. The data for the […]
The UK Government is giving GCHQ, Intelligence services and law enforcement full hacking powers. People are scared by a law that gives GCHQ the immunity. New legislation exempting police, GCHQ and other officers from intelligence department from prosecution in a connection to mobile and computer hacking by the said government guns, has been passed by […]
The Anonymous collective continues the wave of cyber attacks against the Expo 2015 Universal Exposition, the last victim in order of time is the Best Union. Anonymous Italy continues to target the Expo 2015Â Universal Exposition being hosted in Milan with a series of attacks under the Operation Italy (#OpItaly). The collective of hackers it targeting […]
A team of researchers explains that million of lives potentially depends on the resilience to cyber attacks of a new generation of “artificial pancreas.” Medical devices are open to cyber attacks, many studies have demonstrated that a large number of medical systems could be affected by security flaws that could be exploited by hackers. A […]
Russian hackers have developed a Sony PS4 crack which is used by Brazil retailers to break console security and sell pirated games to their customers. A group of Russian crackers has discovered a method to hack the popular Sony PS4 and bypass its security measures. The group is offering it hack on the Brazilian market, […]
Pro-Isis Hackers belonging to Cyber Caliphate hacking team threaten âElectronic Warâ on US and Europe. Which are ISIS cyber capabilities? Is the Islamic State group able to engage a cyber war against Western countries? According to prominent hackers affiliated with the terrorist, the ISIS hackers have the abilities to hit computer systems in US and Europe. […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Hiring hackers, how much is it? US SOCOM and The Special Forces to Scrutinize Social media Skynet, the US top-secret program to track terrorists PHP hash comparison flaw is […]
The Penn State suffered a high sophisticated cyber attack that that seems to be originated from China and that exposed data belonging to 18K people. The Pennsylvania State University’s College of Engineering confirmed that it has been targeted by two “highly sophisticated” cyber attacks over the last two years. “Today (May 15), University leadership announced […]
The computer security researcher Chris Roberts reported the FBI that he obtained the control of at least one commercial flight causing it to âclimbâ. A new search warrant filed in a federal court in New York state published Friday by the Canadian website APTN revealed that the aviation computer security researcher Chris Roberts reported the FBI that […]
The Debian-based distribution Tails 1.4 (The Amnesiac Incognito Live System) is available online and it is improved to preserve user privacy and anonymity. The Debian-based distribution Tails, âThe Amnesiac Incognito Live System,âversion 1.4Â is available online! Tails is a popular live operating system (that means that users can start it on almost any computer from removable […]