Internet users that want to create a new account on Twitter through the Tor network must now provide a phone number to verify their identity. A few days ago, Twitter announced plans to begin tracking users via their mobile phone number, a measure that the company consider necessary in order to fight the trolls. Following the […]
FREAK, a new major security flaw that left users of Apple and Google devices exposed to MITM attack while visiting supposedly secure Websites. IT industry is facing with a new major security SSL/TLS vulnerability that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of […]
A GAO report to FAA reveals that the systems adopted in the Aviation industry are still affected by weaknesses that could be exploited by hackers. A report published by Government Accounting Office (GAO) in January urges the Federal Aviation Administration (FAA) to adopt a formal process to “Address Weaknesses in Air Traffic Control Systems.” The FAA has taken steps […]
Security experts are alerting on the availability in the underground black market of a zero day exploit for a vulnerability in the phpMoAdmin MongoDB GUI. In February, three students from the University of Saarland in Germany discovered that MongoDB databases running at TCP port 27017 as a service of several thousand of commercial web servers are exposed on the Internet without proper defense […]
DARPA is working on Cognitive Fingerprints authentication process to validate the user identity through the use of software based biometrics. Security plays a crucial role in today’s world. Whether it is a multi-billion organization or a single person with a computer, security is important for all. One of the pillars for cyber security is the […]
Cybercriminals are targeting call centers operators in Apple Pay fraud to circumvent the checks implemented by Apple, banks and card issuers. The security expert Cherian Abraham revealed a spike in the fraud on Apple’s mobile payment platform, Apple Pay. The criminals are trying new techniques to compromise the Apple security chain. While the Apple devices and software are […]
D-Link routers contain a vulnerability that could be exploited by attackers to get root access remotely and run several attacks. Once again security experts have found security vulnerabilities in home routers, these devices are a privileged target of cyber criminals that exploit the flaws in the software they run for several purposes. This time the flawed routers […]
A British hacker has found two Blu-Ray-borne attacks that could be run to infect machines, a technique that remind the method used by the Equation Group. Security expert Stephen Tomkinson from NCC Group has discovered a couple of vulnerabilities in the software used to play Blu-ray discs. The exploitation of the flaw could be used to implant […]
A cyber resilience approach: the need to become cyber resilient is very essential because eliminating risks completely is impossible. Hacking emerged as a geeky, tech-oriented culture that was a little mischievous, but ultimately was about programming and finding faults or bugs in the code. It has evolved over time to become a criminal activity. The […]
A recent report about the privacy policy of Facebook has shed light to potential problems and disagreements with legal concerns in the EU. There is a recent report from Belgium focusing on the revised terms of use that have to do with Facebook. Due to its enormous popularity even apart from the fact that it’s […]