Microsoft recently fixed the a vulnerability in the Bitlocker disk encryption feature that could be exploited to easily bypassed it is a few seconds. A disk encryption tool is a very important software for the protection of our data, million machines rely on them to protect user data, but we have to consider that also […]
Anonymous launched the #OpParis to track terrorists online. We are Anonymous. We are Legion. We do not forget. We do not forgive. Expect us! Last Friday was a sad day for the humanity, 129 innocent people were killed in the Paris attacks managed by members of the ISIS. Every event has consequences in the cyber […]
A security loophole in the official Gmail Android app opens the email spoofing attacks allowing anyone to change the sender email name. The independent security researcher Yan Zhu has discovered a serious security issue in the Gmail Android app allows ill-intentioned to send an email pretending to be someone else. Clearly a similar loophole could represent a […]
At the MobilePwn2Own, a Chinese expert has demonstrated how to hijack an Android smartphone by exploiting a zero-day flaw in the Chrome browser. The Chinese expert Guang Gong from Qihoo 360 has demonstrated how to hijack an Android smartphone by exploiting a flaw in the Chrome browser. The researcher demonstrated the hack at the MobilePwn2Own at the […]
A hacker shut down the website of the Norwich airport in just a few minutes to demonstrate the importance of a proper approach to the cyber security. A few days ago the website of the Norwich Airport was shut down by a hacker managed, the attack was conducted in a few minutes revealing serious problems of […]
A duo of security researchers, Daniel Komaromy of San Francisco and Nico Golde of Berlin, demonstrated how to intercept calls using bogus base stations. PacSec Modern Samsung devices, including the last generation Samsung S6, S6 Edge and Note 4, are vulnerable to phone eavesdropping. A duo of experts, Daniel Komaromy of San Francisco and Nico […]
The Director of the Tor Project Roger Dingledine has accused the FBI of commissioning to the Carnegie Mellon boffins a study on methods to de-anonymize Tor users. The experts at the Tor Project have collected more information about the attack launched last year by Carnegie Mellon researchers on the popular anonymizing system. The Director of the […]
A research published by CyberArk Labs focuses on targeted attacks against organizational networks, analyzing hackers’ methods, tools and techniques. Bad news for network administrators, according to the security company CyberArk, 88 percent of networks are susceptible to privileged account hacks. The report published by CyberArk entitled “Analyzing Real-World Exposure to Windows Credential Theft Attacks” reveals that corporate […]
Experts from Check Point firm published a new report on the Rocket Kitten APT that include more insight into the activities of the group. Do you remember the Rocket Kitten ATP? The Rocket Kitten group has been suspected to be active since 2011 and have been increasing their activity since 2014. The main targets are based in the Middle […]
Kaspersky Lab issued a report that warns users of the possible risks when facing with connected coffee machines and other wireless-enabled home devices. The paradigm of the Internet of Things has dramatically enlarged our surface of attack, smart devices surrounding us are a privileged target for cyber criminals. What about your coffee machine? The coffee machines could become […]