SAP Security experts discovered a number of unpatched vulnerabilities and weaknesses in Oracle PeopleSoft that could be exploited to obtain admin passwords. The SAP security experts, Alexander Polyakov and Alexey Tyurin, revealed that Oracle PeopleSoft contains unpatched vulnerabilities and weaknesses that could be exploited by attackers to obtain admin passwords. The impact of such vulnerabilities […]
Marauderâs Map is the name of a Chrome extension developed by Aran Khanna to simply track Facebook users using Facebook Messanger data. A student from Cambridge, Aran Khanna, has developed a Chrome extension that allows tracking Facebook friends on map. The developer named the extension Marauderâs Map as the magical Marauderâs Map from the Harry Potter books that reveals all of […]
Linux/Moose is a malware family that targets Linux-based consumer routers turning them into social network bots to use for illegal activities. ESET released a study about a new malware known as Moose worm that is compromising devices that have a weak or default credentials. The principal target of the Moose worm are the linux-based routers, […]
A bug affecting the Messages app allows a string of characters sent to a person via iMessage or SMS to crash an iPhone and cause the Messages app to crash A bug in the Apple iOS can cause the Messages app crash and iPhones automatically reboot when they receive a specific crafted text message. The […]
Iran – The Cyber Attacks Emergency Center in FATA has thwarted a major cyber attack  originated from US against the Oil Ministry. The Iranian Government announced that on Tuesday it had foiled a cyber-attack on the Islamic republic’s Oil Ministry. According to the Fars news agency, the Brigadier General Kamal Hadianfar, head of the cyber police, confirmed […]
An Eagle High School student may be charged with a felony after being accused of a cyber attack on the West Ada school district. I have decided to write about this story because it is the demonstration of the interference of cybercrime with the teenager’s life, a 17-year old high school student might be accused […]
Researchers at Context Information Security have demonstrated that it is very easy to monitor IoT devices that implement the Bluetooth Low Energy protocol. The Internet of Things is enlarging our surface of attack, it’s not a mystery, track us is becoming even more easy as demonstrated by a group of researchers at Context Information Security. The team […]
Security experts at FireEye have published a report that details the cyber threats targeting various sectors in the Nordic countries. According to FireEye, threat actors targeted strategic industries (i.e. aerospace and defense, energy, health and pharmaceuticals, and shipping), government and defense agencies searching for political, economic and military intelligence. Experts believe sophisticated threat groups could be […]
The group of hackers known as Yemen Cyber Army has hacked the computer systems at Saudi Arabia, they control also Interior Ministry and Defense Ministry. The group of hackers known as Yemen Cyber Army has hacked the computer systems at Saudi Arabia. The Hacking crew compromised the website, servers and databases belonging to the Saudi Arabia’s Foreign, […]
Hi-tech car thieves use ÂŁ30 jamming devices in car parks, the devices allow them to bypass car coding and reprogramme vehicles before driving off in them. Car thieves are becoming even more technological, we have read many news regarding hackers that designed specific solutions to hack car through the internal CAN bus or simply to unlock car doors […]