DDOS attacks have become cheaper than one can think, just because of the era of DDOS-for-hire services. However, such attacks are easier to launch now and don’t cost much, but when it comes to the victim – it costs $40,000 per hour to them considering the loss. Incapsula revealed in its annual Report of DDoS […]
Government records stolen in the recent data breach at the US OPM (Office of Personnel Management) are surfacing from the Dark Web. While security experts speculate on the possible responsible for the recent data breach at US the Office of Personnel Management (OPM) the alleged data appeared in the dark web. I have personally found it on […]
A German security researcher reported hundreds of wind turbines and solar systems wide open to easy exploits worldwide due to the lack of security by design The German researcher Maxim Rupp has discovered numerous security issues in clean energy systems, including solar lighting and wind turbines. The possible consequence of a cyber attack is the […]
Following the recent OPM data breach the White House requested IT administrators to implement and adopt basic security measures. A few days ago news media agencies reported the data breach at the US Office of Personnel Management (OPM), according to the US Government the hack is one of the largest breaches of federal employeesâ data. Data […]
An interesting overview of the hacking services offered by the platform Hackerâs List reveals that hacking Facebook accounts is the most common request. Last week the colleagues at The Hacker News explained how to exploit a simple trick to take over a WhatsApp account, today they have decided to write a post describing a newborn hacking community. The experts […]
Cyber security expert Cesar Cerrudo once again is warning the IT security community on the risks related to the deployment of vulnerable traffic lights. Cesar Cerrudo, CTO at IOActive, has conducted several tests to investigate on the security of components within control systems of traffic lights and electronic signs in different cities around the world discovering […]
A security expert discovered that United Airlines accounts could be locked-out by running a brute-force attack. The effects on a large scale could be serious. According to WorldMate security officer Yosi Dahan, a threat actor could easily lock-out United Airlines users from their accounts. Dahan explained that reported the security issue in March under the United Airlines bug bounty […]
A security expert demonstrated how to exploit a vulnerability in Apple IOS system to steal user password with a phishing email. A new vulnerability that affects Apple’s iOS could be exploited by hackers to collect user passwords by using a single email. Jan Soucek (@jansoucek) , a forensic expert at Ernst and Young has developed […]
Threat actors used a Duqu 2.0 worm in a series of attacks worldwide that also breached the systems at Kaspersky Lab. It is most complex malware ever seen. A new powerful strain of Duqu malware, dubbed Duqu 2.0, appeared in the wild after going dark in 2012. Duqu 2.0 is a very sophisticated agent that exploited a number […]
FireEye speculates that behind the hack of Franceâs TV5Monde television channel there is the popular APT28 that used the pseudonymous ISIS Cyber Caliphate. Security experts involved in the investigation on the hack of Franceâs TV5Monde television channel revealed that behind the pseudonym of ISIS âCyber Caliphateâ there were Russian hackers. “Russian hackers posing as the ISIS âCyber Caliphateâ […]