Following the recent OPM data breach the White House requested IT administrators to implement and adopt basic security measures. A few days ago news media agencies reported the data breach at the US Office of Personnel Management (OPM), according to the US Government the hack is one of the largest breaches of federal employeesâ data. Data […]
An interesting overview of the hacking services offered by the platform Hackerâs List reveals that hacking Facebook accounts is the most common request. Last week the colleagues at The Hacker News explained how to exploit a simple trick to take over a WhatsApp account, today they have decided to write a post describing a newborn hacking community. The experts […]
Cyber security expert Cesar Cerrudo once again is warning the IT security community on the risks related to the deployment of vulnerable traffic lights. Cesar Cerrudo, CTO at IOActive, has conducted several tests to investigate on the security of components within control systems of traffic lights and electronic signs in different cities around the world discovering […]
A security expert discovered that United Airlines accounts could be locked-out by running a brute-force attack. The effects on a large scale could be serious. According to WorldMate security officer Yosi Dahan, a threat actor could easily lock-out United Airlines users from their accounts. Dahan explained that reported the security issue in March under the United Airlines bug bounty […]
A security expert demonstrated how to exploit a vulnerability in Apple IOS system to steal user password with a phishing email. A new vulnerability that affects Apple’s iOS could be exploited by hackers to collect user passwords by using a single email. Jan Soucek (@jansoucek) , a forensic expert at Ernst and Young has developed […]
Threat actors used a Duqu 2.0 worm in a series of attacks worldwide that also breached the systems at Kaspersky Lab. It is most complex malware ever seen. A new powerful strain of Duqu malware, dubbed Duqu 2.0, appeared in the wild after going dark in 2012. Duqu 2.0 is a very sophisticated agent that exploited a number […]
FireEye speculates that behind the hack of Franceâs TV5Monde television channel there is the popular APT28 that used the pseudonymous ISIS Cyber Caliphate. Security experts involved in the investigation on the hack of Franceâs TV5Monde television channel revealed that behind the pseudonym of ISIS âCyber Caliphateâ there were Russian hackers. “Russian hackers posing as the ISIS âCyber Caliphateâ […]
ISIS supporters are spreading online a collection of tutorial titled the Book of Terror to teach how Hack a Wi-FI network and which are main spying tools. ISIS militants are spreading a small package, titled Book of Terror, containing data of various spy tools, as well as tutorials on how to hack Wi-Fi networks in […]
Autonomous and connected vehicles, self-driving cars, are exposed to numerous cyber threats and the risk of hacking is concrete. After Security expert and hacker, Chris Roberts announced the possibility of hacking into aircrafts, more tension about the security of autonomous and connected vehicles has come to the fore. These cars are expected to be on […]
Crooks are using the NFC capability of Android smartphone to steal your credit card data, two researchers presented the PoC at the HITB. Crooks are using the NFC capability of Android smartphone to steal your credit card data, itâs scaring but true. But first letâs introduce the Near field communication (NFC) as “a set of […]