Anonymous has posted a video message threatening Israel with âthe electronic holocaustâ which would âerase it from cyberspaceâ on next April 7. Once again the group of  hacktivits Anonymous has threatened Israel with âthe electronic holocaustâ which would âerase it from cyberspace.â The massive cyber attack announced by Anonymous is planned on April 7 for âcrimes in the Palestinian territories.â […]
G20 World leaders were victims of accidentally privacy breach, but Australian authorities decided to not inform victims due to low risk of exposure. The personal details of world leaders have been accidentally revealed by the organisers of the G20 summit, passport numbers and other details belonging to Obama, Xi Jinping, Putin, Merkel, Cameron, Modi and others were […]
Find out more about online crime and understand why it can be so fruitful, unlike other forms of crime, in order to thoroughly protect your financial transactions and banking details. Unfortunately, nowadays due to the fact that we are used to going on vacation and hold a lot of money in our pockets, it is […]
Modern maritime ships are considered a privileged target for hackers and pirates that are increasing their pressure on the Maritime Shipping Industry. Hackers target Cyber Attack on Ships: Maritime Shipping Industry at Risk Modern maritime ships are often monitored and controlled remotely from shore-based facilities thousands of miles away to ensure efficiency. This creates a […]
Syrian Electronic Army hacked BlueHost, Hostgator, Justhost, FastDomain and HostMonstor companies because they hosted websites managed by terrorists. Syrian Electronic Army (SEA) is an unstoppable cyber brigade that once again gained the attention of the principal media for a clamorous hack. SEA is a popular group of hacked aligned with Syrian President Bashar al-Assad, is the past […]
The New York Times reported that a group of hackers is interfering with the activities made through social media by members of the ISIS group. According to The New York Times hackers are targeting accounts used by ISIS members for propaganda and recruit new sympathizers. A group of hackers using the pseudonyms of TouchMyTweets, The Doctor and IS Hunting are targeting suspected ISIS […]
Security experts at Symantec security firm have uncovered a persistent diet spam operation on Twitter that presents interesting aspects. In July 2014, experts at Symantec have uncovered a spam campaign offering the Green Coffee Bean Extract, a diet supplement, a few months later the experts discovered that the same operators behind campaign is continuing its activities […]
Thomas JiĹikovskĂ˝ suspected of owning the black marketplace Sheep Marketplace, an alternative for Silk Road, was arrested while trying to buy a luxury house. The Operation Onymous and the seizure of the popular Silkroad black market have deeply influenced the underground ecosystem. The closure of Silkroad advantaged other black markets like Evolution and Sheep Marketplace. The Evolution […]
A new study conducted by researchers at the Carnegie Mellon University revealed that dozens of mobile apps collect extensive location data. A new study conducted by researchers at the Carnegie Mellon University revealed that a number of Android mobile apps collects geolocation data related to the users. According to the Wall Street Journal, the researchers […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Just a unicode string of 13 characters to crash Mac Chrome tab Chrome, Firefox, Safari and IE â All Browsers Hacked at Pwn2Own Competition PoSeidon the most sophisticated PoS […]