Cyber security expert Cesar Cerrudo once again is warning the IT security community on the risks related to the deployment of vulnerable traffic lights. Cesar Cerrudo, CTO at IOActive, has conducted several tests to investigate on the security of components within control systems of traffic lights and electronic signs in different cities around the world discovering […]
A joint international operation led to the dismantling of a criminal gang who is behind the Operation Triangle phishing campaign. A joint effort of Law enforcement from six countries, including Italy, Spain, Poland,Belgium, the U.K., and Georgia, allowed the arrest of 49 suspects fraudsters. Twenty individuals were arrested in Italy, 10 in Spain, 18 in […]
Apple’s iOS 9 will force users to strengthen the device passcode and improve the two-factor authentication mechanism. Apple is revealing a series of improvement for its new iOS 9, today we have discussed the content blocker announced by Apple, and the company now announced new measures to improve the security of its devices. The iOS9 will substitute the 4-digit […]
German media states that Bundestag may need to replace 20,000 computers after the recent attack, an operation that could cost millions Euro. A few days ago the experts the German Government has confirmed that hackers who breached the Bundestag systems a few of weeks ago have also stolen data from targeted network. A spokeswoman for the Bundestag, […]
Apple announced a series of improvement for it IOS 9, including a content blocker can kill a lot of applications similar the popular AdBlock. A lot have been talks about IOS 9, and now looks like Apple included an ad-blocking feature in its OS, I would say it is a great news for its customers, […]
A security expert discovered that United Airlines accounts could be locked-out by running a brute-force attack. The effects on a large scale could be serious. According to WorldMate security officer Yosi Dahan, a threat actor could easily lock-out United Airlines users from their accounts. Dahan explained that reported the security issue in March under the United Airlines bug bounty […]
A security expert demonstrated how to exploit a vulnerability in Apple IOS system to steal user password with a phishing email. A new vulnerability that affects Apple’s iOS could be exploited by hackers to collect user passwords by using a single email. Jan Soucek (@jansoucek) , a forensic expert at Ernst and Young has developed […]
Threat actors used a Duqu 2.0 worm in a series of attacks worldwide that also breached the systems at Kaspersky Lab. It is most complex malware ever seen. A new powerful strain of Duqu malware, dubbed Duqu 2.0, appeared in the wild after going dark in 2012. Duqu 2.0 is a very sophisticated agent that exploited a number […]
FireEye speculates that behind the hack of France’s TV5Monde television channel there is the popular APT28 that used the pseudonymous ISIS Cyber Caliphate. Security experts involved in the investigation on the hack of France’s TV5Monde television channel revealed that behind the pseudonym of ISIS “Cyber Caliphate” there were Russian hackers. “Russian hackers posing as the ISIS “Cyber Caliphate” […]
Belgian law enforcement exploited end-to-end encryption gaps in WhatsApp to intercept messages exchanged between members of a Chechen jihadist group. According to a report published by Bloomberg, two men were arrested and warrants were issued for other three suspects that were allegedly preparing a terrorist attack in Belgium. The interesting part of the news is that law […]