Donald Trump called for a sweeping ban on Muslims entering the United States soil and Anonymous declared war against him. After the recent campaign #OpParis against the ISIS militants, the popular collective of hackers Anonymous now turned its effort against the billionaire Donald Trump which is a US presidential candidate. Donald Trumpâs call for a sweeping […]
The British Government as part of the Investigatory Powers Bill is planning to hack children’s smart toys to snoop on suspects. We discussed several times the possibility to spy on people through smart device, including smart toys. A couple of weeks ago, the security expert Matt Jakubowski explained that the new Wi-Fi-Enabled Hello Barbie can be hacked to extract […]
Censys is a new Search Engine for devices exposed on the Internet, it could be used by experts to assess the security they implement. Now the hackers and experts have a new powerful tool for their analysis, it is Censys, a search engine quite similar to the most popular Shodan. Censys is a free search engine that […]
Trend Micro announced that the Asian market are being targeted more than ever by well-funded cyber criminal group that appears very organized. The attacks rely on the Bifrose code to develop their backdoor, a malware that has been around since 2008. In 2014 it was reported that a new version of Bifrose appeared in the wild. Among the improvements observed […]
A New Zealander expert has found hundred of thousands of vulnerable engine immobilizers are remotely hackable due to a flaw. The New Zealander Lachlan Temple (@skooooch) has discovered hundred of thousands of vulnerable engine immobilizers are remotely hackable. The expert discovered a flaw in a popular cheap car tracking and immobilizer gadget that can allow remote attackers […]
Experts at enSilo have found a critical security vulnerability in various antivirus (AV) software that could be exploited by attackers to turn the AntiVirus to an attack-enabler tool. Some of the most important security firms have had an ugly surprise, the security software they offer to their clints have been compromised by a serious vulnerability flaw […]
Two anomalous DDoS attacks have flooded the Internet root servers that received more than 5 million queries a second. Early last week, anomalous DDoS attacks have threatened the Internet root servers that received more than 5 million queries a second. “The authoritative name servers that serve the DNS root zone, commonly known as the âroot serversâ, […]
According to a new report published by Trend Micro, the North American cyber criminal underground is very easy to access. The new report released by Trend Micro reveals that the cyber criminal underground market in North America isnât so hidden like in other countries. “It doesn’t exist in the dark web as much as other […]
Hashcat, the popular password recovery tool has been released as open source under the MIT license. You can contribute to it. The popular password cracking tool Hashcat is not an open source software, the announcement was first made on December 4 on Twitter via an MD5 hash that posted  the following message: âhashcat open sourceâ @hashcat […]
According to an advisory published by the KoreLogic firm the Linksys EA6100-6300 wireless routers are vulnerable to attacks due to flawed CGI scripts. Once again IoT devices are in the headlines, once again SOHO routers are affected by a security vulnerability that opens users to cyber attacks. According to the KoreLogic firm, the flawed devices […]