Patriot missile systems stationed in Turkey near the Syrian Border were briefly taken over by hackers according to the Behorder Spiegel magazine According to the Behorder Spiegel magazine, hackers were able to send “unexplained” orders to the Patriot missiles stationed in Turkey. The Patriot missiles are part of the anti-aircraft system, the systems are manufactured in […]
Security experts at Trend Micro revealed that one of the exploits discovered in the Hacking Team package tied to Attacks In Korea and Japan. Following the recent hack of the popular surveillance firm Hacking Team, the experts started the analysis of the material leaked online by the attackers. The package leaked online include also a number […]
Google finds websites meanwhile Shodan finds devices exposed on the web, including Internet of Things devices, that’s why hackers love it! In 2009 John Matherly introduced the Shodan search engine, and at the time the media commented this with doubts and suspicion. Shodan indexes the information related devices exposed on the internet in the same way […]
Trading was halted for more than two hours on the NYSE floor, contemporary United Airlines system and the Wall Street Journal suffered a temporary outage. The scenario could appear apocalyptic, yesterday trading was halted for more than two hours on the New York Stock Exchange (NYSE) floor and at the same time United Airlines and the […]
Morpho is the name of a financially motivated espionage group that targets large enterprises, including Microsoft, Apple, Twitter, and Facebook. Security experts have discovered and analyzed the activities of a financially motivated APT group, dubbed Morpho and Wild Neutron, that has targeted a large number of high profile companies worldwide. According to the analysis published by […]
Security experts confirmed that Adobe Flash vulnerability revealed in the recent attack against the Hacking Team is being used in the wild. Every IT security website is publishing information related to the recent hack of the Hacking Team and consequent exfiltration of more than 400 GB of sensitive data. The most scaring scenario is already […]
According to new revelations of the popular whistleblower Edward Snowden the powerful spying machine XKEYSCORE runs on Red Hat Enterprise Linux. In August 2013, Edward Snowden revealed the existence if a tool named DNI Presenter that allows the Agency to read the content of stored emails, and it also enables the intelligence analysts to tool collects […]
Hackers are using a new search engine poisoning method to circumvent Google’s page ranking-algorithms, the technique relies on PDF documents. Researchers from Sophos discovered the new search poisoning method used to circumvent cloaking-detection mechanisms implemented by Google. The experts found hundreds of thousands of unique PDF documents per day implementing the poisoning technique. The term cloaking indicates the […]
Cyber attacks can crash trains. Intense security concerns have emerged, after the upgrade of the British railway network that can be affected by malware. The new railway network upgrade in the United Kingdom has raised a lot of concerns, as far as its overall network security is concerned. It seems that over thirty million pounds […]
Researchers discovered several exploits in the data stolen from the Hacking Team, including ones for zero-day vulnerabilities. The recent hack of the Hacking Team firm has caused the exposure of 400GB of corporate data which includes source code (GitHub repository), emails and other sensitive documents belonging to the surveillance software firm. According to security experts at Trend Micro, the […]