The Israeli company ARTSYS 360 is developing a small 3D electronic radar that will be able to monitor drones in small areas. Recently I wrote a post on an Aerial Assault Drone recently presented at the Black Hat conference, the vehicle was equipped with hacking tools to compromise wi-fi target networks. The use of drones is increasing and […]
Cisco is warning enterprise customers about a spike in attacks in which hackers use valid admin credentials on IOS devices to install bogus ROMMON images. Be aware network administrators, Cisco released a new Security Activity Bulletin referring a spike in attacks in which hackers use valid credentials on IOS devices to log in as administrators […]
Chinese computer manufacturers Lenovo has been caught once again using a hidden Windows feature to preinstall unwanted and unremovable rootkit. Lenovo firm was accused several times to supplying equipment for networks of the intelligence and defense services various countries that allowed the Chinese Government to run espionage operations. In 2013, Spy agencies reportedly have a long-standing […]
Carphone Warehouse disclosed a sophisticated attack that may have impacted more than 2.4 million customers. Attackers covered the breach with DDoS attacks. On Saturday Carphone Warehouse (CW) was reportedly swamped by hackers than may have accessed personal and financial details of around 2.4 million customers according to the mobile retailer. The data breach affects customers […]
A Spanish-based security analyst demonstrated new satellite capturing traps that could allow to surf anonymously with High-speed Internet. Digital signals can be conveyed to certain places by satellites where the Internet appears like a wonder: off-the-network desert sunlight based homesteads, the Arctic or a plane carrying warship adrift. Be that as it may, in radiating […]
Microsoft announced in the Tuesday’s bulletin that crooks have been exploiting a vulnerability that allows to execute malicious code using booby-trapped USB Microsoft announced in the last Tuesday’s bulletin that crooks have been exploiting a vulnerability that allows to execute malicious code using booby-trapped USB. The vulnerability affects all supported versions of Windows OS as […]
A security flaw in the Facebook API allows hackers to decrypt and scan user IDs, nearly 1.44 billion Facebook users are at risk of identity theft. The security researcher Reza Moaiandin, Technical Director at Salt Agency, discovered a flaw in Facebook’s API that can allow hackers to scan for user ID, and that leaves about […]
Kaspersky revealed provided an update of the report on the Darkhotel APT that targets executives traveling across Asia through hotel internet networks. In November 2014, Kaspersky Lab published a report on the activities of the Darkhotel APT group. Security experts at Kaspersky Lab uncovered the Darkhotel espionage campaign, which is ongoing for at least four years while targeting selected […]
A senior U.S. intelligence official revealed that Chinese hackers have accessed the private emails of “many” top Obama administration officials. According to an official of the US intelligence, Chinese hackers have accessed the private emails of “many” top members of the Obama administration. The news was reported by the NBC News which obtained a top […]
Security Experts at IBM have discovered a new critical vulnerability affecting Android OS and impacting more than 55 percent users. There is no peace for the Android users, recently experts discovered the critical Stagefright vulnerability and other serious flaws like the Certifi-gate vulnerability and CVE-2015-3823 flaw. Now experts from IBM have discovered another critical bug in the Google Android OS that impacts more […]