@FFD8FFDB is a Twitter bot that spies on poorly configured cameras tweeting the images captured by the connected devices. There is an air of mystery when you first notice @FFD8FFDB. However, the next thing you will see is that really gets on to you. There is a strange Twitter account, @FFD8FFDB, that every few minute tweets pictures taken […]
A group of hackers named “New World Hackers” claims the DDoS attack on BBC’s website. They launched it to test their attack capabilities. On December 31th, the BBC website and iPlayer service went down due to a major “distributed denial of service” attack.” The attack started at 0700 GMT and paralyzed the websites for more than […]
The hacking crew dubbed Fail0verflow has managed to hack PlayStation 4 (PS4) to run a Linux kernel-based operating system. The PlayStation 4 is considered by the experts a fortress so the hacking community is always interested in any news regarding its hack. Recently a hacker who calls himself CTurt claimed to develop a fully jailbroken version of the PlayStation 4 […]
A team of researchers has evaluated the level of cyber security implemented in modern railroad systems and discovered several vulnerabilities. A team of experts composed of Sergey Gordeychik, Alexander Timorin and Gleb Gritsai of SCADA StrangeLove, recently disclosed their findings at the 32nd Chaos Communication Congress (32C3) in Germany. Railroads belong to the critical infrastructure of a […]
The Tor officially announced to launch the Tor Bug Bounty Program in the next year, a great news for the Tor community. The non-profit organization that is maintaining the TOR project plans to launch very soon a Tor Bug Bounty Program for researchers who find vulnerabilities in the popular anonymizing platform. This is a great for all the […]
If you login to Windows 10 using your Microsoft account you have to know that your computer automatically uploaded a copy of your recovery key. New Windows computers implement a built-in disk encryption feature that is turned on by default to protect user data in case the device is lost or stolen. Be aware, this device encryption […]
Adobe has released security patches for Adobe Flash Player to fix critical vulnerabilities that could be exploited to take control of the affected system. Adobe released an emergency patch for Flash Zero-Day (CVE-2015-8651) that is currently being exploited in targeted attacks. The out-of-band security update issued on Monday fix a number of security vulnerabilities that could be exploited […]
The security expert Chris Vickery has discovered a misconfigured archive exposes the personal details of 191 million U.S. voters. A misconfigured database is the root cause of the exposure of around 191 Million voter records. The records include voters’ full names, unique voter IDs, unique voter IDs, date of births and phone numbers. The database […]
Experts at Symantec discovered that hackers quickly take advantage of CVE-2015-8562 remote code execution to compromise Joomla servers. Joomla recently patched the CVE-2015-8562 vulnerability that could be exploited by attackers for remote code execution. According to the security expert Daniel Cid from Sucuri, hundreds of attacks are now taking place. âWhat is very concerning is that this […]
Which are the main events observed in the darkweb during the 2015 and what to expect in the next 12 months? The DarkWeb is a set of publicly accessible content that are hosted on websites whose IP address is hidden, but to which anyone can access it as long as it knows the address. The […]