Is Two-factor authentication the solution for any kind of hacks? A text message could be used to take over your Google Account. Following the recent data breaches suffered by IT giants (e.g. MySpace, LinkedIn, Twitter) security experts are inviting users to avoid sharing login credentials on multiple websites and to enable two-factor authentication (2FA) when it […]
CERT-Bund released a warning that corporate executives may be being targeted with malicious emails using data from the LinkedIn data breach. The cascading effects of the 2012 LinkedIn breach are still being felt throughout the business world. On Monday, CERT-Bund, Germany’s Computer Emergency Response Team for federal agencies, released a warning that corporate executives may […]
Twitter investigated account login credentials recently offered for sale on the dark web, locked the accounts and reset their passwords. This week a Russian hacker offered for sale more than 32 million Twitter account credentials on the Dark Web. The alleged Russian hacker offered Twitter account credentials for 10 Bitcoins (over $5,800). In response to the […]
The Necurs Botnet, one of the world’s largest malicious architecture, used to spread the dreaded threats appears to have vanished since June 1. In the last months, we have read a lot of news regarding the activities on one of the largest botnet in the wild that was used by crooks to deliver the Dridex […]
Experts have discovered several SQL injection vulnerabilities in the European Union Websites, the European Parliament and the European Commission sites The security experts Vulnerability Lab CEO Benjamin Kunz Mejri and Marco Onorati have discovered a number of SQL injection vulnerabilities in the websites of the European Parliament and the European Commission. The exploitation of the flaws in […]
A security expert discovered that a crafted PDF document that includes an embedded JPG2000 image can trigger a buffer overflow in the Chrome PDF reader. The security expert Aleksandar Nikolic from the Cisco Talos group has discovered an arbitrary code execution vulnerability (CVE-2016-1681) in PDFium, which is the PDF reader component installed by default in Google Chrome […]
China is ready to launch its first hack proof quantum communication satellite, are we entering a new era of telecommunications. Satellites have a crucial role in our digital society, almost every industry is benefiting from their services for this reason their security is a pillar of the cyber security strategy of governments worldwide. Attackers are posing […]
The ÎĽTorrent team announced its community ÎĽTorrent forum has been hacked. Hundreds of thousand records belonging its users have been exposed. Are you a Torrent user? Are you one of the users of the popular μTorrent Forum? You might be in trouble because the ÎĽTorrent Forum was hacked. ÎĽTorrent is one of the most popular BitTorrent clients, […]
The FTC’s chief technologist gets her mobile phone number hijacked, she shared her experience of a victim of such kind of Id Theft. The incident that I’m going to tell you is worrisome, the US Federal Trade Commission’s chief technologist Lorrie Cranor gets her phone number hijacked. The FTC’s chief technologist was hacked by someone posing […]
Boffins released a paper describing how computer processors can be programmed to give elevated privileges to hackers and run fabrication-time attacks. A team of researchers from the University of Michigan recently released a paper describing how computer processors can be programmed to give elevated privileges to hackers. The paper titled, “A2: Analog Malicious Hardware,” describes […]