Today I present you The PøwerfulGreÉkArmy (aka PGA), a hacker collective focused in the fight against the ISIS propaganda online. Enjoy the Interview. Tell me more about PGA? Which is your motivation? So ,we are a new hacking team with 7 skilled hackers. Our motivation is to stop pedophiles and ISIS doing actions. PGA ‘s […]
WhatsApp doesnât properly erase your deleted messages, researcher reveals Are you using WhatsApp? There is an interesting news for you, the popular instant messaging app doesn’t properly erase the user’s deleted messages. The issue was reported by the popular iOS security researcher Jonathan Zdziarski who is warning about the risks for the users’ privacy. The flaw […]
The group of hackers known as China 1937CN Team compromised the announcement screen systems at many major airports in Vietnam. According to the 2015 version of the âTransportation Systems Sector-Specific Planâ the transportation industry is increasingly exposed to cyber threats. The sector is becoming a privileged target of hackers worldwide, the last incident in order of […]
Today I have interviewed Watcher one of the hackers belonging to #GhostSec that fights IS propaganda online. GhostWatcher participated in various hacking campaigns, including #OpISIS and #OpPedoHunt. Enjoy the Interview. You are a talented hacker that has already participated in several hacking campaigns, could you tell me more about. I never refer to myself as a talented hacker. Mostly […]
Israeli experts discovered a vulnerability within the JavaScript that proxy PAC files that allows HTTPS URLs interception via Proxy Attacks. Israeli security firm, Safebreach, has discovered a vulnerability within the JavaScript that proxy PAC files used for auto-configuration. Hackers could be used to extrapolate URLs and manipulate them. Proxy Auto Config or PAC files work […]
Palo Alto Networks recently discovered a Remote Access Trojan dubbed SpyNote that is free available allowing anyone to launch attacks in the wild. I love when the sale happens in malls. People just rush and want to get good things for cheap prices. And who doesn’t love something free? The spyware and malware market is highly lucrative when […]
A security duo designed a hacking UAV dubbed Danger Drone, with it a drone equipped with a tiny PC that run a suite of hacking tools. What do you think if I propose you to use a drone to hack into a network? And what about air-gapped networks hacking? In order to hack into an isolated network, the […]
The Russian Intelligence agency, the FSB, announced the discovery of a spyware in the computer networks belonging to at least 20 organizations. While security experts and the US law enforcement speculate the involvement of Russian state-sponsored hackers behind the DNC hack, the Federal Security Service, the FSB, announced the discovery of a spyware in state […]
Media outlet continues to publish news regarding the DNC hack, computer servers used by Clinton campaign were compromised as part of DNC hack. The news of the recent Democratic National Convention (DNC) hack is monopolizing the technological debate around the US presidential campaign. Yesterday I reported the news of another hack against the operation of the DNC, according to the Reuters, […]
Another attack hit the Democratic Party organization, this time, the Democratic Partyâs congressional fundraising DCCC committee was hit by hackers. The Democratic Party organization continues to be under attack, this time, the Democratic Partyâs congressional fundraising committee was hit by hackers. According to the Reuters, the FBI is investigating a security breach of the systems of the […]