Adobe has released a security update for the critical Adobe Flash Player vulnerability CVE-2015-3113 that is being actively exploited in the wild. Security experts at FireEye discovered a critical heap buffer overflow vulnerability, coded CVE-2015-3113, that affects Adobe systems. FireEye discovered that the Adobe flaw is being exploited in the wild by the hacking crew […]
A security researcher is trying to harvest information about Tor sites that propose illegal products, and in some cases he even discovered their address. The Dark Web is known to be “the place” for sites where it can be found drugs, child pornography, weapons, because these websites can live on without disclosing the server location […]
What is the Dark Web? Unveiling the myth of the Dark Web and making sure that people understand its magnitude and its limitations. Letâs begin by explaining what the so called âDark Webâ actually is. This is a term used to describe a collection of websites that may be publicly visible, but they hide information […]
Documents leaked by Edward Snowden show the NSA and the GCHQ efforts to compromise security software companies including Kaspersky Lab.  A new collection of documents leaked by the popular whistleblower Edward Snowden reveals that both UK and US government intelligence agencies are targeting principal security firms and security companies. Kaspersky Lab calls nation-states’ targeting of security companies […]
The Europol announced the creation of a team that aims to find key figures in propaganda campaigns run by ISIS members seeking to recruit foreign fighters. Isis‘s machine propaganda is a very important target, since it generates something like 100.000 daily tweets, and itâs used to recruit foreign fighters to support the group. Isis is gaining […]
A cyber attack against the ground computer systems of the Polish flagship carrier LOT grounded more than 1,400 passengers at Warsawâs Okecie airport. The Polish national airline, LOT, announced on Sunday that it has cancelled 10 flights due to a cyber attack against the airlineâs ground computer systems at Warsawâs Okecie airport. “Today afternoon LOT […]
A recent wave of car burglaries raises the debate on possible hacking techniques adopted by car thieves .. Signal amplification and brute-force attacks. A few months ago the journalist Nick Bilton wrote about his car being broken into in front of him. Bilton believes that his car was stolen by using snatched with the help of a signal […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. OPM hack: White House orders the adoption of best practices Researcher found Wind turbines and solar systems vulnerable worldwide OPM data offered for sale on the Dark Web Wikimedia […]
Security experts at Symantec are warning about a new password recovery scam targeting Gmail users worldwide mainly for intelligence gathering. Every day scammers propose new techniques to steal personal information and other sensitive data. Today we will speak of a new social engineering technique used in the wild by crooks that allow them to hack into […]
Period 2015 has become a continuous process of turbulent scenarios in cyberspace because new potential threats, by dealing new opportunities for cybercrime. Period 2015 has become a continuous process of turbulent scenarios in cyberspace because new potential threats, by dealing new opportunities for cybercrime with massive Cyber Poisons. Nevertheless, Antidotes are also part of a […]