A group of researchers have developed a method dubbed Mass Vetting (MassVet) to find unknown malicious apps in app stores in 10 Seconds. A group of University researchers has created a new method for detecting malicious apps running on an Android devices called MassVet. MassVet doesn’t use the old method of signatures scanning, instead it compares […]
Agora black marketplace announced Tuesday evening that it will go temporary offline fearing the exploitation of the Tor flaws recently discovered. Operators of principal black markets are concerned about the real level of anonymity offered by the Tor network after the discovery of critical vulnerabilities affecting the anonymizing system. The administrators of the Agora black market, one […]
Security experts at Sensecy have uncovered ORX-Locker, a Darknet Ransomware-as-a-service platform that could allow everyone to become a cyber criminal. It is becoming even easier to become a cyber-criminal thanks to the model of sale known as malware-as-a-service that offers off-the-shelf malware for rent or sale. Recently malware authors started to offer also Ransomware-as-a-Service (RaaS), in […]
Charlie Miller and Chris Valasek, the famous car hackers who recently demonstrated that some Fiat Chrysler cars can be remotely hijacked, have been hired by ridesharing giant Uber. The popular hackers Charlie Miller and Chris Valasek who recently hackers a Fiat connected car have announced that they have been hired by the Uber Company. Miller and Valasek […]
PaloAlto and with WeipTech have identified 92 samples of a new iOS malware family in the wild dubbed KeyRaider that compromised over 225,000 Apple accounts. Palo Alto networks announced recently that a new iOS malware called KeyRaider allowed crooks to take over more than 225.000 apple accounts on jailbroken iOS devices. KeyRaider allows the attackers […]
Corebot is a new data stealer discovered by the experts at IBM Security X-Force while they were analyzing some endpoints protected by their solutions. Corebot is the name of a new data stealer malware discovered by the experts at IBM Security X-Force while they were analyzing some endpoints protected by their product, the Trusteer Apex […]
This post explains how to use the PowerMemory script to reveal the passwords used by users of the computers running under Windows systems. Disclaimer Any actions and or activities related to the material contained within this blog is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against […]
The jihadist hacker Junaid Hussain was killed this week in a US targeted air strike in Syria. The man was actively recruiting ISIS sympathizers. A spokesman for the US Central Command, Colonel Patrick Ryder, confirmed that the jihadist hacker Junaid Hussain was killed in a targeted air strike on August 24 in Raqqa, Syria. Colonel […]
Six British teenagers have been arrested on suspicion of attacking websites by using the Lizard Squad’s DDoS tool, the Lizard Stresser. Lizard Squad is the popular hacking crew that brought the online gaming networks Sony PlayStation Network and Microsoft Xbox Live with major Distributed Denial-of-Service (DDoS) attacks. The hackers developed a tool dubbed Lizard Stresser that draws on Internet […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Who are the Ashley Madison users? Hacking the Iridium network could be very easy Amazon to trash Flash, as browsers walk away Keyless Cars: A New Frontier For Bug […]