The âheterogony of endâ is a famous expression formulated in 1886 by the German philosopher Wihelm Wundt, what about the Hacking Team case? After the hack of the controversial government spying and hacking tool vendor Hacking Team by an outside attacker, a large  numbers of media headlines worldwide reported the events. [1,2,3] The hacker announced […]
The newfound critical vulnerability on Twitter seems to allow remote code execution! Which is the reason behind the recent Twitter security issues? The newfound critical vulnerability on Twitter seems to allow remote code execution! The last days we have seen some cases that have to do with Twitterâs security making us wonder if the famous […]
The NSA and other intelligence agencies are spending a significant effort in research for hacking IoT devices for both surveillance and sabotage. Intelligence agencies worldwide are looking with increasing interest to the Internet of Things paradigm, intelligent objects surround us and manage an impressive volume of data related to of existence. Thanks to the Internet of Things devices, we […]
WauchulaGhost Hacker groups linked to Anonymous hijack ISIS supporters’ Twitter accounts and flood their profiles with PORN picture and irreverent messages. Anonymous is continuing its online battle against the ISIS propaganda machine, this time, Twitter accounts managed by the terrorist organization have been flooded with a large number of pornographic posts. It seems that the attacks […]
Is Two-factor authentication the solution for any kind of hacks? A text message could be used to take over your Google Account. Following the recent data breaches suffered by IT giants (e.g. MySpace, LinkedIn, Twitter) security experts are inviting users to avoid sharing login credentials on multiple websites and to enable two-factor authentication (2FA) when it […]
CERT-Bund released a warning that corporate executives may be being targeted with malicious emails using data from the LinkedIn data breach. The cascading effects of the 2012 LinkedIn breach are still being felt throughout the business world. On Monday, CERT-Bund, Germanyâs Computer Emergency Response Team for federal agencies, released a warning that corporate executives may […]
Twitter investigated account login credentials recently offered for sale on the dark web, locked the accounts and reset their passwords. This week a Russian hacker offered for sale more than 32 million Twitter account credentials on the Dark Web. The alleged Russian hacker offered Twitter account credentials for 10 Bitcoins (over $5,800). In response to the […]
The Necurs Botnet, one of the world’s largest malicious architecture, used to spread the dreaded threats appears to have vanished since June 1. In the last months, we have read a lot of news regarding the activities on one of the largest botnet in the wild that was used by crooks to deliver the Dridex […]
Experts have discovered several SQL injection vulnerabilities in the European Union Websites, the European Parliament and the European Commission sites The security experts Vulnerability Lab CEO Benjamin Kunz Mejri and Marco Onorati have discovered a number of SQL injection vulnerabilities in the websites of the European Parliament and the European Commission. The exploitation of the flaws in […]
A security expert discovered that a crafted PDF document that includes an embedded JPG2000 image can trigger a buffer overflow in the Chrome PDF reader. The security expert Aleksandar Nikolic from the Cisco Talos group has discovered an arbitrary code execution vulnerability (CVE-2016-1681) in PDFium, which is the PDF reader component installed by default in Google Chrome […]