The popular hacker Kevin Mitnick explains how it is easy to steal data from a network tapping the cable, even if it’s a fiber optic network. Kevin Mitnick demonstrates how easy it is for a hacker to tap into your network and read your email messages, even if it’s a fiber optic network. Kevin Mitnick […]
A cyber attack against the ground computer systems of the Polish flagship carrier LOT grounded more than 1,400 passengers at Warsaw’s Okecie airport. The Polish national airline, LOT, announced on Sunday that it has cancelled 10 flights due to a cyber attack against the airline’s ground computer systems at Warsaw’s Okecie airport. “Today afternoon LOT […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. OPM hack: White House orders the adoption of best practices Researcher found Wind turbines and solar systems vulnerable worldwide OPM data offered for sale on the Dark Web Wikimedia […]
A group of researchers demonstrated that encryption keys can accidentally leak from a PC via radio waves by using a cheap consumer-grade kit. In the past we have already spoken about the possibility to steal sensitive data from a computer by analyzing radio waves and electromagnetic emissions. The researchers Daniel Genkin, Lev Pachmanov, Itamar Pipman […]
Security experts at ERPScan discovered a serious security issue in SAP’s in-memory relational database management system, HANA. The SAP in-memory relational database management system, HANA, is affected by a serious security issue, the static encryption key is stored in the database. The fact that the encryption key is static means that every SAP HANA installation […]
A team of researchers from Indiana University discovered a number of XARA vulnerabilities in both Apple’s OS X and iOS that allows Apple Keychain crack. A team of researchers from Indiana University (Luyi Xing, Xialong Bai, XiaoFeng Wang, and Kai Chen lead by Tongxin Li, of Peking University, and Xiaojing Liao, of Georgia Institute of […]
Security expert at Voidsec have analyzed the popular social networking minds.com disclosing a number of security vulnerabilities. Security expert at Voidsec, Paolo Stagno ( aka voidsec – [email protected] ) and Luca Poletti ( aka kalup – [email protected] ), have analyzed the popular social networking platform minds.com that is getting attention by media because it aims to give transparency and protection to user […]
Anonymous claimed responsibility for running DDoS attacks on Canadian government systems against the approval of anti-terror law C-51. An ongoing cyber attack is targeting systems of the Canadian Government, including Government websites and email systems. The cyber attack started a few days after members of the Canadian parliament were warned of an impending attack. The […]
More than 600 million Samsung S devices could be opened to cyber attacks because a flaw in the validation of language pack updates for the SwiftKey keyboard. More than 600 million Samsung smartphones could be opened to cyber attack due to the presence of a security flaw in the validation of the Swiftkey language pack updates. The […]
Security experts at Nettitude reported that VoIP (Voice over IP) infrastructures worldwide are targeted by a growing number of cyber attacks. A new wave of attacks against Voice over IP (VoIP) systems is targeting UK businesses, security experts believe that a surge was advantaged by the greater availability of hacking tools in the criminal underground. […]