Two security experts have conducted a study that allowed them to spot over 100 snooping Tor HSDir Nodes spying on Dark Web Sites. The attempts of snooping traffic from Tor nodes are not a novelty, in the past, we have reported the activity of threat actors that set up malicious exit nodes to de-anonymize users. Early 2014, […]
The Android full-disk encryption can be easily cracked with a brute force attack, hundreds of millions of Android mobile are at risk. Bad news for Android users that want to protect their data by enabling full-disk encryption (FDE) on their mobile devices. The Android full-disk encryption can be easily cracked with a brute force attack, […]
The Lizardsquadâs botnet known as LizardStresser is now leveraging on Internet of Things devices, latest waves of DDoS attack reached 400Gbps. The Lizardstresser DDoS botnet has been increasing in popularity throughout 2016 and is being used increasingly to target the Internet of Things. Arbor Networks reported in their blog, a marked increase since the start […]
Researchers discovered two flaws in the Siemens SICAM PAS widely used in the energy industry. One of the vulnerabilities is still unpatched. Security experts from Positive Technologies that have reviewed the Siemens SICAM PAS (Power Automation System) solution have discovered two information disclosure vulnerabilities (CVE-2016-5848 and CVE-2016-5849) that can be exploited by a local attacker. The experts […]
Cisco released security patches for some of its products that fix critical and high severity flaw that could be remotely exploited by hackers. Cisco has released security patches for a number of high-severity vulnerabilities in the CISCO Management and other security products. One of the flaws, a critical vulnerability in the Cisco Prime Collaboration Provisioning (CVE-2016-1416), […]
According to the 2015 version of the ‘Transportation Systems Sector-Specific Plan’ the transportation industry is increasingly exposed to cyber threats. The transportation industry is considered part of the critical infrastructure of a country, and according to the IBMâs X-Force security team is it a privileged target for hackers. The report, Security Trends in the Transportation […]
The Thomson Reuters terrorist database World-Check used by banks and intelligence agencies worldwide was leaked online, 2.2 million records exposed. There is a terrorist database used by banks and intelligence agencies worldwide, it is called World-Check and unfortunately, it was leaked online. The leaked database is dated back 2014 and contains some 2.2 million records. […]
On Monday the Hard Rock Hotel & Casino in Las Vegas disclosed for the second time a data breach that compromised customers’ payment card data. It has happened again, earlier this week the Hard Rock Hotel & Casino in Las Vegas disclosed a data breach, it is the second time the casino suffered a cyber attack. […]
Russian cyber spies belonging to the Pawn Storm APT group have targeted a significant number of Google accounts belonging to individuals worldwide. The Pawn Storm APT group is once again in the headlines, this time the hackers targeted a significant number of Google accounts belonging to individuals in Russia, former Soviet Union countries, the United States, Europe. […]
Symantec has fixed dozens of critical vulnerabilities affecting its solutions that can be exploited by remote attackers for arbitrary code execution. The popular Google Project Zero hacker Tavis Ormandy last month reported a number of critical security issues in Symantec solutions, and this is the good news. The bad news is that Symantec promptly fixed one […]