A new collection of documents leaked by Edward Snowden shines light on shadowy New Zealand surveillance activities operated at the Waihopai Base. A new collection of documents leaked by Edward Snowden provides an interesting analysis of the relationship between the Five Eyes countries and the surveillance activities they managed. The documents published Saturday by the […]
The security firm Bluebox discovered a preinstalled malware, many malicious apps, and a series of security holes on the Xiaomi Mi 4 smartphone. After the episode of Lenovo pre-installed malware, another case is worrying the IT community. This time, security firm Bluebox has discovered pre-installed malware and other security issues with a Xiaomi Mi 4 mobile […]
A group of researchers from TrapX Security demonstrated how to infiltrate home networks by compromising a Nest thermostat. We already discussed in the past of the risks related to cyber attacks against IoT devices, these smart objects are everywhere, including our homes, so they represent a privileged target for hackers. Security experts from TrapX Security demonstrated how […]
British NCA has arrested a 23-year-old man suspected to be a member of the hacking crew that run the attack on the US Department of Defense in the 2014. British law enforcement has identified and arrested a 23-year-old man over a hacking attack on the US Department of Defense on June 15, 2014. The law […]
Researchers hack NSAâs website with only $104 and 8 hours of Amazonâs cloud computing power using the #FREAK vulnerability A team of researchers demonstrated that it is possible to exploit the FREAK vulnerability to hack the official NSA website by using 8 hours of Amazonâs cloud computing power and spending only $104. The researcher made […]
Internet users that have recently installed or updated the popular BitTorrent client ÎŒTorrent 3.4.2 Build 28913 may have installed a Bitcoin miner. Internet users that have recently installed or updated the popular BitTorrent client ÎŒTorrent 3.4.2 Build 28913 had a nasty surprise, the application, in fact, installed a Bitcoin miner as explained in this advisory. “Users […]
Kaspersky Lab experts carried out a study of the principal threats for children encountered in 2014 by users of the Parental Control module. The Internet is a dangerous place for Children, almost every teenager is always online through desktop PC and mobile device, resulting exposed to dangerous threats. The dangers are not negligible for children […]
Air Force Exchange Service (AAFES) confirms that following the SIGA data breach, confidential data belonging to US military personnel were exposed. A bad news for the US military, the Army and Air Force Exchange Service (AAFES) confirms that, following a the data breach of the German telecom company SIGA Telecom and an AAFES contractor occurred on March 5, […]
The increasing number of cyber incidents along with a significant improvement of TTP adopted by threat actors requests the adoption of a cyber hygiene. The rate of data breaches are increasing drastically throughout the year. Cyber-attacks could cause severe disruption to a companyâs business functions or operational supply chain, impact reputation, compromise customer information or […]
According to a security advisory published by Microsoft all supported versions of Windows are affected by the recently discovered FREAK vulnerability FREAKÂ is major security SSL/TLS vulnerability recently discovered that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of legitimate and secure websites. The critical […]