The former Secretary of Defense William Cohen revealed that the US power grid is vulnerable to terror attacks, a major cyber attack was a matter time. Security experts and US politicians are aware that the power grid is vulnerable to a terrorist attack. Nation’s power grid is a privileged target for terrorists as explained by the former […]
Security researcher discovered a strain of the Kovter trojan that has been updating  Flash Player and Internet Explorer to prevent further infections. The French security expert Kafeine have discovered a new strain of the Kovter malware noticing that the instance of the malicious code he was analyzing was attempting to download the latest version of the Flash […]
 IPv4 Exhaustion: The North America ran out of IPv4 addresses and according to the ARIN it has officially exhausted its supply of IPv4 addresses. The news of the day is that North America ran out of IPv4 addresses and according to The American Registry for Internet Numbers (ARIN) it has officially exhausted its supply of IPv4 […]
Wikileaks reveals an extended economic espionage activity conducted by the NSA in Germany, the spies were particularly interested in the Greek debt crisis. Recently we spoke about the last collection of data disclosed by Wikileaks on NSA massive surveillance, highlighting the cyber espionage operations of the US intelligence against principal security firms and the France politicians, today we […]
Every 18 seconds a new mobile Android malware is discovered in the wild as reported in the G DATA Malware Report Mobile for Q1 2015. Security firm GDATAÂ has published a report on mobile malware detected in the first quarter of 2015. The researchers discovered 440,267 new strains of Android malware, a new malware strain for […]
ProxyHam is a hardware device designed by a group of researchers to allow anonymous connections to Wi-Fi from about 2.5 Miles away. Security researcher Benjamin Caudill has designed a device that allows to keep anonymous users online experience, an amazing system for the anonymity of whistleblowers, journalists and dissidents. Caudill named his device ProxyHam, it’s a “hardware […]
Founder of the ahmia.fi project reported that someone is cloning and booby trapping hundreds of Dark Web sites and is re-writing some of the content. The “ahmia.fi” project census Dark Web websites, aka hidden services, by providing search engine functionalities by indexing the content present on the Tor network. Nurmi noticed an anomalous number of clones of hundreds […]
FBI has published the lists of most wanted hackers, the rewards for their capture reach $4.2 million. They have stolen hundreds of millions of dollars. Cybercrime represents one of the most serious threat to Governments and private industries worldwide, law enforcement hunt down this emerging class of criminals who are able to influence the social […]
Researchers discovered a vulnerability in the 802.11n wireless networking standard that could be exploited by a remote attacker to target wireless networks. According to researchers from the Expertise Centre for Digital Media at the Hasselt University in Belgium, the frame aggregation mechanism implemented by the 802.11n wireless networking standard is affected by a security a […]
Law enforcement is investigating a series of mysterious attacks on the Fiber-optic cable lines in California. Who is behind these attacks? The FBI is investigating a series of mysterious physical attacks on internet cables in California. The investigators confirmed that at least eleven cases occurred in San Francisco’s Bay Area in the last year. The […]