The rise of the Internet of Things is being heralded by many as the beginning of a new Industrial Revolution. Technology firms are now linking objects ranging from household appliances to industrial machinery to the internet. With telecommunications firms on board, manufacturers are coming up with new, innovative uses for everyday objects. Yet linking these […]
At Black Hat USA, the security researcher Elie Bursztein demonstrated the dangers of found USB drive and how to create a realistic one. Giving a look at the titles of the presentations in the agenda of the Black Hat USA Conference 2016 I noticed an interesting topic proofed by the security expert Elie Bursztein, the […]
Security experts have uncovered several critical flaws in Cisco Small Business Routers that in some cases could result in the take over of the device Security experts Adam Zielinski and Harri Kuosmanen reported to CISCO several critical and high severity flaws in the CISCO Small Business Routers. According to CISCO, the CVE-2015-6397Â flaw affects RV series […]
The Israeli intelligence firm Intsights has breached a Telegram ISIS group, members shared info on US bases in Kuwait, Bahrain, Saudi Arabia. The Israeli security firm Intsights claims to have breached a Telegram group run by jihadists that were planning to attack a list of US bases in Kuwait, Bahrain, Saudi Arabia. The company announced to […]
Hackers accessed Telegram accounts in Iran, a security duo investigated the security breach and will present its findings at the Black Hat Conference. 15 million Iranian Telegram accounts have been compromised, users have reportedly had their personal information exposed (phone number, Telegram ID). The security researchers Collin Anderson and Claudio Guarnieri have investigated the case, more […]
Paladin is a hacker that has participated in several hacking campaigns which is known for its efforts against the ISIS propaganda online. Did you participate in several hacking campaigns? could you tell me more about you? I have participated in many operations and campaigns over my 9 years in this community, I started at basic coding […]
Weston Hecker, a security researcher with Rapid7, has devised a $6 tool to open guest rooms and hack into Point-of-Sale systems. It is not difficult to image that it is quite easy for hackers to hack a hotel room door, but it is surprising to discover that it is possible to do with a $6 […]
Operation Pacifier is the massive hacking campaign against computers worldwide launched by the FBI in early 2015 to track criminals on the dark web. We are now aware that the FBI launched a massive hacking campaign against computers worldwide in early 2015 in the attempt to de-anonymize criminals visiting dark web child porn website The use of the NIT was […]
The notorious hacker Peace is advertising 200 Million alleged Yahoo accounts on Dark Web, and the company is aware of the sale. Do you remember the notorious hacker Peace? He is the hacker that offered for sale the dumps of LinkedIn and MySpace, and now he has once again a surprise for the security experts. Peace is advertising […]
The Chinese authorities have arrested 10 members of the popular Wooyun ethical hacking community, including the founder Fang Xaiodun. Chinese authorities have arrested popular white hats operating in the country, including the founder of one of the larger online ethical hacker community. The reason behind the arrest is still a mystery, the news was reported […]