A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. OPM hack: White House orders the adoption of best practices Researcher found Wind turbines and solar systems vulnerable worldwide OPM data offered for sale on the Dark Web Wikimedia […]
Security experts at Symantec are warning about a new password recovery scam targeting Gmail users worldwide mainly for intelligence gathering. Every day scammers propose new techniques to steal personal information and other sensitive data. Today we will speak of a new social engineering technique used in the wild by crooks that allow them to hack into […]
A group of researchers demonstrated that encryption keys can accidentally leak from a PC via radio waves by using a cheap consumer-grade kit. In the past we have already spoken about the possibility to steal sensitive data from a computer by analyzing radio waves and electromagnetic emissions. The researchers Daniel Genkin, Lev Pachmanov, Itamar Pipman […]
This post is an excerpt from the article titled “Evolution of 3D Printing Technology Raises Security Concerns” available on the Infosec Institute. Also known as the term additive manufacturing (AM), 3D printing is a process for making a three-dimensional object of almost any shape starting from a 3D model or other electronic data source. Through […]
NIST is seeking more advanced tattoo forensic analysis, matching the tattoos into a computer system could help law enforcement to catch more offenders. One in five American adults has at least one tattoo and this number is much higher among the criminal population. Law enforcement has used tattoos as a means of criminals and victim […]
Security experts at ERPScan discovered a serious security issue in SAPâs in-memory relational database management system, HANA. The SAP in-memory relational database management system, HANA, is affected by a serious security issue, the static encryption key is stored in the database. The fact that the encryption key is static means that every SAP HANA installation […]
WikiLeaks on Thursday released 276,394 new files from the Sony Pictures hack, the documents demonstrates the influence of the company on US the Gov. WikiLeaks added more 276,394 documents to its search page, these documents were acquired when the alleged group of North Korean hackers GOP hacked the Sony network. The first documents were published […]
Trustwave firm published a report related to 2014 incidents that revealed cyber criminal activities are paying with 1,425% return on investment. Hackers are seeing a whopping 1,425% return on investment for these two kinds of attacks Security experts at Trustwave published an interesting report on the return on investment related to illegal activities online. The experts revealed that […]
A team of researchers from Indiana University discovered a number of XARA vulnerabilities in both Appleâs OS X and iOS that allows Apple Keychain crack. A team of researchers from Indiana University (Luyi Xing, Xialong Bai, XiaoFeng Wang, and Kai Chen lead by Tongxin Li, of Peking University, and Xiaojing Liao, of Georgia Institute of […]
Security expert at Voidsec have analyzed the popular social networking minds.com disclosing a number of security vulnerabilities. Security expert at Voidsec, Paolo Stagno ( aka voidsec â [email protected] ) and Luca Poletti ( aka kalup â [email protected] ), have analyzed the popular social networking platform minds.com that is getting attention by media because it aims to give transparency and protection to user […]