The security expert Brian Krebs investigated the links between the Carbanak cybercrime gang and the Infocube security firm. Today I want to share with you the findings of an investigation of the popular cyber security expert Brian Krebs. This time, Krebs investigated the link between a cybercrime gang and a security firm. The security company […]
Let’s continue the series of interviews with talented hackers some of them like Scrub are involved in anti-ISIS campaigns. Scrub is a member of #GhostSquadHackers and currently involved in the #opTurkey campaign. Enjoy the Interview. You are a popular talented hacker that has already participated in several hacking campaigns, could you tell me more about. I started off […]
In military jargon, the term Red Team is traditionally used to identify highly skilled and organized groups acting as fictitious rivals and/or enemies to the “regular” forces, the Blue Team. Whenever we discuss Information Security from a defensive point of view, we are inclined to think about protection, damage control, and reaction. However, adopting an […]
The NSA whistleblower Edward Snowden and the popular hacker Andrew “Bunnie” Huang designed Introspection Engine, an interesting anti-surveillance device. While the number of mobile devices is outclassing the number of desktop ones, the concern about the surveillance activities conducted by governments is growing as never before also thanks the Snowden revelations. Mobile devices, often unprotected, […]
Today I have interviewed The r00t, a young and skilled hacktivist that participated in many hacking campaigns online, he is a former Lulzsec volunteer. He assumed the name r00t recently, he was known with a different pseudonymous online, but he preferred to remain anonymous. The interview is very interesting, enjoy it! Hi, you are a young talented […]
The US federal authorities asked a 3D printing lab to recreate a dead man’s fingers to unlock his smartphone … will it work? Do you remember the battle Apple vs FBI conducted to force the IT giant on unlocking the San Bernardino Shooter’s iPhone, well it has become a story of the past. The federal authorities […]
18 out of 276 vulnerabilities fixed by Oracle with the last Patch Update resides in the OIT libraries that are used by products of numerous major vendors. The last critical Patch Update released by Oracle this week is in the headlines for the number of patches it includes. It includes the fixes for 276 vulnerabilities, 19 of […]
The Turkish Government blocked the access to WikiLeaks after release of the Erdogan emails, 300,000 government emails date 2010 to July this year. Cyberspace and the real world are even more interdependent, the observation of the events in both environments is an essential activity for the analysts to predict evolutionary scenarios. The world is attending events […]
Today, it is a pleasure for me to interview an Italian colleague, Matteo Meucci, a great professional, a perfect mix of talent and discipline. Enjoy the interview. Hi Matteo, you are one of the most respected Italian experts on cyber security. Could you tell me which his your technical background and when you started hacking? […]
This critical flaw CVE-2016-4631 resides in the ImageIO and could be exploited by a remote attacker to steal sensitive information from Apple devices. Apple fans, I have a bad news for you, just one specially-crafted message can expose your personal information, including your authentication credentials stored in the memory of your Apple device. This means […]