A security expert demonstrated how to exploit a vulnerability in Apple IOS system to steal user password with a phishing email. A new vulnerability that affects Apple’s iOS could be exploited by hackers to collect user passwords by using a single email. Jan Soucek (@jansoucek) , a forensic expert at Ernst and Young has developed […]
Threat actors used a Duqu 2.0 worm in a series of attacks worldwide that also breached the systems at Kaspersky Lab. It is most complex malware ever seen. A new powerful strain of Duqu malware, dubbed Duqu 2.0, appeared in the wild after going dark in 2012. Duqu 2.0 is a very sophisticated agent that exploited a number […]
FireEye speculates that behind the hack of France’s TV5Monde television channel there is the popular APT28 that used the pseudonymous ISIS Cyber Caliphate. Security experts involved in the investigation on the hack of France’s TV5Monde television channel revealed that behind the pseudonym of ISIS “Cyber Caliphate” there were Russian hackers. “Russian hackers posing as the ISIS “Cyber Caliphate” […]
Belgian law enforcement exploited end-to-end encryption gaps in WhatsApp to intercept messages exchanged between members of a Chechen jihadist group. According to a report published by Bloomberg, two men were arrested and warrants were issued for other three suspects that were allegedly preparing a terrorist attack in Belgium. The interesting part of the news is that law […]
ISIS supporters are spreading online a collection of tutorial titled the Book of Terror to teach how Hack a Wi-FI network and which are main spying tools. ISIS militants are spreading a small package, titled Book of Terror, containing data of various spy tools, as well as tutorials on how to hack Wi-Fi networks in […]
Security experts at Fortinet uncovered a new strain of the Vawtrak banking Trojan is implementing an obscuring mechanism based on the Tor2Web service. The authors of the banking Trojan Vawtrak are adopting a new tactic to hide the traffic to its servers, they are exploiting the Tor2Web service to masquerade malicious connections. In the past, criminal crews behind […]
Autonomous and connected vehicles, self-driving cars, are exposed to numerous cyber threats and the risk of hacking is concrete. After Security expert and hacker, Chris Roberts announced the possibility of hacking into aircrafts, more tension about the security of autonomous and connected vehicles has come to the fore. These cars are expected to be on […]
Crooks are using the NFC capability of Android smartphone to steal your credit card data, two researchers presented the PoC at the HITB. Crooks are using the NFC capability of Android smartphone to steal your credit card data, it’s scaring but true. But first let’s introduce the Near field communication (NFC) as “a set of […]
The hackers of the SEA, the Syrian Electronic Army, defaced the US Army website exploiting an Army’s commercial content delivery network provider. After a short period of silence, the group SEA and defaced the official website of the US Army and added a pop-up message displaying the following text: “Your commanders admit they are training the people they […]
After 4M records may have been stolen and Chinese hackers are the prime suspects, the US Govrecognizes the usefulness of the DHS EINSTEIN defense system. After 4 million records may have been stolen and Asia-based hackers are the prime suspects, the government recognizes the usefulness of the DHS EINSTEIN defense system. At this time, the […]