A group of cyber criminals hacked systems the systems of the France Televisions and have stolen data on 100,000 contacts stored by the French state TV. Another cyber attack hit a French TV, this time the hackers compromised the computers at the network of the broadcaster stealing  personal data belonging 100,000 contacts. According to an […]
Google Launches Chrome 42 that deprecates the NPAPI (Netscape Plugin API)  due to the numerous problems it caused in the past. Google has released Chrome 42, a version that implements the important choice to exclude any plugin using the API called NPAPI (Netscape Plugin API) to extend browser functionalities. The Netscape Plugin API is dated back 1990 […]
The elite cyber crime group Hellsing strikes back after attack by the rival APT crew known as Naikon. This is the first documented case of APT-on-APT attack. What happens when an APT group running a cyber espionage campaign target a second distinct APT group? The events occurred last year, when a group involved in a cyber espionage campaign […]
A recent report published by Dell revealed a 100 percent increase in the number of attacks on industrial control (SCADA) systems. The new Dell Annual Threat Report revealed that the number of attacks against supervisory control and data acquisition (SCADA) systems doubled in 2014 respect the previous year. Unfortunately, the majority of incidents occurred in SCADA systems is […]
A researcher discovered that Belkin implements a vulnerable procedure to generate WPS PINs. Just knowing MAC and the serial number he can calculate it. A security researcher who goes by the name of Craig has discovered a critical flaw affecting Belkin network devices. that could be exploited by attackers to calculate the WPS PINs. In […]
A group of Turkish hackers shut down the official website of the Vatican City to protest against Pope Francescoâ statements on the Armenian Genocide. Turkish hackers have taken down the Vatican City official website for revenge against the recent statements by Pope Francesco on the Armenian genocide. The hacking group named Herakles (@THTHerakles) announced that he will continue the […]
The Redirect to SMB vulnerability affects all supported versions of Windows and could be exploited to steal usersâ credentials for various services. Experts at Cylance have discovered a new credential hijacking vulnerability dubbed Redirect to SMB that affects all versions of Windows OSs, including the upcoming Windows 10. The Redirect to SMB could be exploited by an attacker […]
Unknown hackers have leaked another set of Kelly Brook’s Nude Pictures online, this is the second time after the Fappening case of the last year. The Fappening cases are probably the most popular privacy breaches that are known to ordinary people, celebrities nude photo leaks are still circulating in the Internet and raised the discussion about security […]
Encryption has been used by more people over time and this has led to the NSA and the US Government to suggest new ways of accessing encrypted content. The uprising course of encryption and the fact that its use has become a lot more frequent and continues on increasing in popularity has made the United States wonder how they […]
Law enforcement dismantled the Simda botnet in an international joint effort that involved also most important private security firms. Another joint operation conducted by law enforcement worldwide and private firms has dismantled the Simda botnet, investigators seized 14 Command and control servers, ten of which located in the Netherlands. Other C&C servers were located found […]