The Israeli Cellebrite firm is helping the Federal Bureau of Investigation (FBI) in unlocking San Bernardino shootersâ iPhone. In the last weeks, we have followed the case of the San Bernardino shooter’s iPhone that a few days ago reached an unexpected conclusion, the FBI announced on Monday to have found a way to unlock the mobile device without […]
Developers from Microsoft and Samba Team are working on a security patch to fix a severe vulnerability dubbed Badlock. Developers from Microsoft and Samba are working on a security patch to fix a severe vulnerability that affects almost every version of Windows and Samba. Samba, which is present in nearly all Linux distributions, is a free […]
Three members of the Syrian Electronic Army hacker crew have been inserted by the US authorities in the list of most wanted criminals. The Syrian Electronic Army, aka SEA, is considered one of most dreaded hacking crew that first appeared in 2011. According to the report âSyrian Electronic Army â Hacktivision to Cyber Espionage?,â published in 2014, […]
Brussels explosions, dozens dead after blasts at Zaventem airport and Maalbeek metro, it is a terror attack. Panic and chaos in the city. The IS claims the responsibility for the attack. This morning the Europe has fallen again in terror, just months after the Paris attacks a new wave of attacks hit the West. This morning a […]
According to the recent Verizon breach digest for March 2016 hackers breached a water utility and manipulated systems for water treatment and flow control. The story that I’m telling you is very disturbing, according to the Verizon breach digest for March 2016 a group of hackers breached a water utility and manipulated systems for water treatment and flow […]
Tor Project revealed how the organization has conducted a three-year long work to improve its ability to detect fraudulent software. The experts at the Tor Project are working to improve the resilience of the anonymizing network to cyber attacks, in particular, they aim to quickly detect any surveillance activity conducted by tempering the Tor system. The researchers fear […]
The US authorities announced on Monday they may have found a way to unlock the San Bernardino shooters iPhone without the Apple’s help. The FBI says it may have discovered a method to bypass Apple security measures and unlock access the iPhone used by one of the San Bernardino attackers, and a today scheduled court hearing in the […]
Google released an emergency security patch to fix the local elevation of privilege vulnerability CVE-2015-1805 affecting its OS. Google has released an emergency security patch to fix the local elevation of privilege vulnerability CVE-2015-1805 affecting the kernel of the Android OS of certain devices. The vulnerability is ranked as critical and can be exploited by rooting applications […]
The Danish intelligence agency FE (Forsvarets Efterretningstjeneste) plans to start its Danish hacker academy to fight threat actors in the cyberspace. Denmark’s FE (Forsvarets Efterretningstjeneste), the country’s intelligence agency, announced last week plans to create a government ‘hacker academy’ in response to the need to improve country cyber security. The Danish hacker academy is a […]
Last week at the CeBIT the Lookout’s Co-Founder and CTO Kevin Mahaffey talked about hacking Tesla Model S providing indications on possible countermeasures. Last week at the CeBIT conference held in Hanover, the Lookout’s Co-Founder and CTO Kevin Mahaffey talked about hacking Tesla Model S providing indications on possible countermeasures. Unfortunately, many security professionals provided […]