Hacking

Healthcare Industry Tops List of Hacker Targets: More than 100 Million Medical Records Compromised in 2015Healthcare Industry Tops List of Hacker Targets: More than 100 Million Medical Records Compromised in 2015

Healthcare Industry Tops List of Hacker Targets: More than 100 Million Medical Records Compromised in 2015

According to a research conducted by IBM the healthcare industry was a privileged target of cybercriminals last year, more than…

9 years ago
The Australian government presents its Cyber Security StrategyThe Australian government presents its Cyber Security Strategy

The Australian government presents its Cyber Security Strategy

The Australian government has presented his Cyber Security Strategy and admitted the ability to conduct offensive cyber operations. The Australian…

9 years ago
MIT designed AI2, the system that can detect 85% of Cyber AttacksMIT designed AI2, the system that can detect 85% of Cyber Attacks

MIT designed AI2, the system that can detect 85% of Cyber Attacks

Security researchers at the MIT designed an Artificial Intelligence system called AI2 that is able to detect 85 percent of…

9 years ago
Hackers spied on a US Congressman’s communication abusing the SS7 protocolHackers spied on a US Congressman’s communication abusing the SS7 protocol

Hackers spied on a US Congressman’s communication abusing the SS7 protocol

Security experts eavesdropped and geographic tracked a US Congressman only using his phone number by abusing the SS7 protocol. Hackers…

9 years ago
The Four Element Sword, weaponized document builder used in APT AttacksThe Four Element Sword, weaponized document builder used in APT Attacks

The Four Element Sword, weaponized document builder used in APT Attacks

Experts analyzed a dozen attacks that leveraged on malicious RTF documents created using the same Four Element Sword builder. Security…

9 years ago
IBM warns a spike in the number of PHP C99 Webshell AttacksIBM warns a spike in the number of PHP C99 Webshell Attacks

IBM warns a spike in the number of PHP C99 Webshell Attacks

IBM Security has warned the WordPress community about a spike in the number of attacks leveraging a specific variant of…

9 years ago
Experts discovered a number of flaws in the Avactis PHP Shopping CartExperts discovered a number of flaws in the Avactis PHP Shopping Cart

Experts discovered a number of flaws in the Avactis PHP Shopping Cart

A group of experts at VoidSec used a Grey Box approach to assess the security posture of some important aspects…

9 years ago
PhineasFisher explained how he breached the Hacking TeamPhineasFisher explained how he breached the Hacking Team

PhineasFisher explained how he breached the Hacking Team

The hacker PhineasFisher published a detailed explanation of how he has hacked the Italian surveillance firm Hacking Team. In July…

9 years ago
Lottery security director hacked random-number generator to rig lotteriesLottery security director hacked random-number generator to rig lotteries

Lottery security director hacked random-number generator to rig lotteries

New evidence collected by prosecutors shows lottery machines were rigged to generate predictable numbers on specific days of the year.…

9 years ago
Europol and Italian Carabinieri an international ATM Skimming networkEuropol and Italian Carabinieri an international ATM Skimming network

Europol and Italian Carabinieri an international ATM Skimming network

The Italian law enforcement corp Carabinieri and the Europol have dismantled an international criminal group responsible for large-scale ATM skimming.…

9 years ago