The UK Government is giving GCHQ, Intelligence services and law enforcement full hacking powers. People are scared by a law that gives GCHQ the immunity. New legislation exempting police, GCHQ and other officers from intelligence department from prosecution in a connection to mobile and computer hacking by the said government guns, has been passed by […]
The Anonymous collective continues the wave of cyber attacks against the Expo 2015 Universal Exposition, the last victim in order of time is the Best Union. Anonymous Italy continues to target the Expo 2015 Universal Exposition being hosted in Milan with a series of attacks under the Operation Italy (#OpItaly). The collective of hackers it targeting […]
A team of researchers explains that million of lives potentially depends on the resilience to cyber attacks of a new generation of “artificial pancreas.” Medical devices are open to cyber attacks, many studies have demonstrated that a large number of medical systems could be affected by security flaws that could be exploited by hackers. A […]
Russian hackers have developed a Sony PS4 crack which is used by Brazil retailers to break console security and sell pirated games to their customers. A group of Russian crackers has discovered a method to hack the popular Sony PS4 and bypass its security measures. The group is offering it hack on the Brazilian market, […]
Pro-Isis Hackers belonging to Cyber Caliphate hacking team threaten ‘Electronic War’ on US and Europe. Which are ISIS cyber capabilities? Is the Islamic State group able to engage a cyber war against Western countries? According to prominent hackers affiliated with the terrorist, the ISIS hackers have the abilities to hit computer systems in US and Europe. […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Hiring hackers, how much is it? US SOCOM and The Special Forces to Scrutinize Social media Skynet, the US top-secret program to track terrorists PHP hash comparison flaw is […]
The Penn State suffered a high sophisticated cyber attack that that seems to be originated from China and that exposed data belonging to 18K people. The Pennsylvania State University’s College of Engineering confirmed that it has been targeted by two “highly sophisticated” cyber attacks over the last two years. “Today (May 15), University leadership announced […]
The computer security researcher Chris Roberts reported the FBI that he obtained the control of at least one commercial flight causing it to “climb”. A new search warrant filed in a federal court in New York state published Friday by the Canadian website APTN revealed that the aviation computer security researcher Chris Roberts reported the FBI that […]
Security researchers at Security Explorations firm have published PoCs code for some of security issues in the Google App Engine. The Polish firm Security Explorations has published online the technical details and a proof-of-concept code for security flaws affecting the Google App Engine (GAE) for Java. “Security Explorations decided to release technical details as well as […]
Recently e-mails, text messages, payments, locations, and other data related with mSpy users were posted on the Deep Web, thousand of kids are at risk. Last week, e-mails, text messages, payments, locations, and other data related with mSpy users were posted on the Deep Web. mSpy, is a software-as-a-service product that officially was designed to […]