British NCA has arrested a 23-year-old man suspected to be a member of the hacking crew that run the attack on the US Department of Defense in the 2014. British law enforcement has identified and arrested a 23-year-old man over a hacking attack on the US Department of Defense on June 15, 2014. The law […]
Researchers hack NSA’s website with only $104 and 8 hours of Amazon’s cloud computing power using the #FREAK vulnerability A team of researchers demonstrated that it is possible to exploit the FREAK vulnerability to hack the official NSA website by using 8 hours of Amazon’s cloud computing power and spending only $104. The researcher made […]
Internet users that have recently installed or updated the popular BitTorrent client μTorrent 3.4.2 Build 28913 may have installed a Bitcoin miner. Internet users that have recently installed or updated the popular BitTorrent client μTorrent 3.4.2 Build 28913 had a nasty surprise, the application, in fact, installed a Bitcoin miner as explained in this advisory. “Users […]
Kaspersky Lab experts carried out a study of the principal threats for children encountered in 2014 by users of the Parental Control module. The Internet is a dangerous place for Children, almost every teenager is always online through desktop PC and mobile device, resulting exposed to dangerous threats. The dangers are not negligible for children […]
Air Force Exchange Service (AAFES) confirms that following the SIGA data breach, confidential data belonging to US military personnel were exposed. A bad news for the US military, the Army and Air Force Exchange Service (AAFES) confirms that, following a the data breach of the German telecom company SIGA Telecom and an AAFES contractor occurred on March 5, […]
The increasing number of cyber incidents along with a significant improvement of TTP adopted by threat actors requests the adoption of a cyber hygiene. The rate of data breaches are increasing drastically throughout the year. Cyber-attacks could cause severe disruption to a company’s business functions or operational supply chain, impact reputation, compromise customer information or […]
According to a security advisory published by Microsoft all supported versions of Windows are affected by the recently discovered FREAK vulnerability FREAK is major security SSL/TLS vulnerability recently discovered that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of legitimate and secure websites. The critical […]
FREAK, a new major security flaw that left users of Apple and Google devices exposed to MITM attack while visiting supposedly secure Websites. Few days back security researchers group (named as SMACK ) made everyone aware of a new SSL/TLS vulnerability, termed as FREAK (CVE-2015-0204). FREAK stands for Factoring Attack on RSA-EXPORT Keys. After POODLE, it […]
The Singapore-based company AdNear is using a fleet of commercial drones to determine users’ location and deliver hyper-targeted ads. Drones that spy on unaware people, a nightmare come true, apparently nothing new considering that it is a common practice of law enforcement and Intelligence agency. The bad news is that also a few advertising companies are also […]
After Babar malware, security researchers detected a new strain of malware dubbed Casper that appears to be linked to the France Intelligence. Surveillance is the primary goal of Intelligence Agencies worldwide, a few weeks ago cyber security researchers detected a new malware, dubbed Babar, that is considered a product of the French intelligence. According to the […]