Mikko Hypponen does not need any introduction, he is a true star, one of those professionals who have indelibly marked the evolution of the cyber security industry. I consider Mikko a legend, and I’m happy to share with you this interview. Enjoy it! Hi Mikko, you are a legend of the hacking community, can […]
Experts discovered that the Controversial Surveillance firm Blue Coat was granted a powerful encryption certificate that can be used for web monitoring. Once again we are here speaking about surveillance, security experts have discovered that the controversial firm Blue Coat Systems was granted powerful encryption digital certificates. Blue Coat sells web-monitoring software, its surveillance appliances were […]
A couple of experts demonstrated how to wirelessly change the time on NTP servers over long distances using an inexpensive equipment. The HACK IN THE BOX conference is a hotbed of interesting hacks, today I will present you the results of a research conducted by the researchers Yuwei Zheng and Haoqi Shan from Qihoo360 firm that explained […]
Hacker interview – Today I have the honor to interview Claudio Guarnieri, aka Nex, one of the most talented hackers and security researchers. Claudio is known as one of the most active civil rights advocate, he is known for his researchers at the Citizenlab, he is creator of the @cuckoosandbox and @malwr. Enjoy the interview! Hi Claudio, […]
A fourth Bank in Philippines was a victim of the SWIFT hackers and experts at Symantec confirmed the malware shares code with tools used by the Lazarus group. The list of banks victims of the SWIFT hackers is lengthening, a fourth bank in the Philippines has been a victim of the crew that targeted the SWIFT interbank transfer system. […]
Today I propose you an interview with Sneaker, one of the members of the GhostSec crew. The Sneaker is a very intriguing expert involved in counterterrorism operations against the ISIL members online. Ghost Security (GhostSec) is an internationally-based counterterrorism group that specializes in intel collection, threat analysis and digital weapons. Its cyber operations consist of collecting actionable […]
The security expert Chilik Tamir from Mi3 Security has devised a new attack dubbed SandJacking to install rogue apps on iOS devices. The security expert Chilik Tamir from Mi3 Security has devised some new attack methods that can be exploited by threat actors to install malicious apps on non-jailbroken iOS devices. Tamir presented his attack methods at […]
Dozens of HTTPS-protected websites belonging to Visa are vulnerable to Forbidden Attack, nearly 70,000 servers are at risk. A new attack technique dubbed ‘Forbidden attack’ expose dozens of HTTPS Visa sites vulnerable to cyber attacks and roughly another 70,000 servers are at risk. A group of international researchers (Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, […]
Leaked WPAD queries could result in domain name collisions with internal network naming schemes exposing corporate to MITM attacks. The U.S. Computer Emergency Readiness Team(US-CERT) issued the Alert (TA16-144A) to warn of leaked WPAD queries could result in domain name collisions with internal network naming schemes. The WPAD queries are intended for resolution on private or enterprise DNS […]
Incapsula experts Igal Zeifman and Dan Breslaw unmasked the availability of stresser and booter DDoS services on Fiverr website at very affordable prices. The Freelancer-finding site Fiverr is offering DDoS attacks-as-a-service for just five dollars. The site connects professionals that offer any kind of services to buyers. If you are searching for a developer to hire, […]