A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Chinese hackers hit Penn State University, 18K people impacted ISIS – Cyber Caliphate hackers are threatening Electronic War Use privacy software if you want to be safe from Facebook, […]
Panda Security firm released a report regarding a hacking campaign dubbed “Operation Oil Tanker: The Phantom Menace” that targeted oil tankers. Security researchers at Panda Security have released a report on a hacking campaign dubbed “Operation Oil Tanker: The Phantom Menace” that targeted oil tankers. According to Panda Security the attacks on oil cargos began in August […]
Cyber criminals have hacked the popular online dating websites Adult FriendFinder leaking the highly sensitive sexual information on a forum in the dark web. The popular dating website Adult FriendFinder was hacked, it suffered a massive data breach that potentially exposed personal details of nearly 4 Million users. According to Channel 4 News, the information was offered […]
A team of security researchers announced to have developed Astoria, a new Tor client designed to beat the NSA and reduce the efficiency of timing attacks. Tor and Deep web are becoming terms even popular among Internet users, the use of anonymizing network is constantly increasing for this reason intelligence agencies are focusing their efforts in its monitoring. […]
Today I was contacted by many friends and followers because they are disappointed regarding a voting proposed by the Infosecurity Europe. http://blogs.infosecurityeurope.com/europes-most-popular-security-blogs-vote-now/ You know my daily effort spent in cyber security, I have thousand people that everyday reads my posts and share them, but evidently it is not enough because I’m out of their business. […]
EBay has recently fixed a reflected file download vulnerability discovered by the security researcher David Sopas at WebSegura. Ebay is among the web services most targeted by cyber criminals and phishers, over the years, security experts have spotted an impressive amount of attack exploiting techniques more or less sophisticated. Almost every attack relies on social engineering, attackers […]
Two security researchers demonstrated that the Android Factory Reset process fails to wipe private data from Android mobile devices. Researchers at Cambridge University, Laurent Simon and Ross Anderson, revealed that more than half a billion Android devices could have data recovered due to flaws in the default wiping process. The experts have analyzed Android 21 devices […]
Security experts at AppRiver firm have discovered a malicious campaign that is distributing a strain of ransomware via SVG files. Researchers at the AppRiver security firm have uncovered a malicious campaign that is distributing a strain of ransomware by exploiting SVG files. The SVG (Scalable Vector Graphics) is an XML-based vector image format for two-dimensional graphics […]
While members of the ISIS are continuing to explore the Deep Web for various activities, the US Intelligence plans activities to track them. The Dark Web is a privileged environment for cyber criminals and state-sponsored hackers due to the anonymity offered by its services. Unfortunately, another category of threat actors is exploiting the deep web, the terrorists, for […]
Law enforcement warns thieves are using the mini-helicopters and commercial drones to carry out reconnaissance on homes to burgle. Security and privacy issued related to the use of drones must be carefully addressed in order to avoid dangerous effects due to their diffusion, there are several ways to abuse of such complex and powerful machines […]