Onapsis study found that over 95% of SAP systems are exposed to vulnerabilities that could lead to full compromise of the companyâs business. SAP is one of the most popular enterprise software used by companies to manage business operations and customer relations. A recent study conducted by the SAP solutions provider revealed that more than 95 percent […]
Law enforcement identifies and located suspects members of a criminal organization that used gas pump skimmers, by using the GPS technology. The number of attacks against ATMs located in supermarkets and Gas pumps is constantly increasing, the crooks use credit and debit card skimmers that use different technologies to steal card data and steal them. Today […]
Hackers have a new tool in their arsenal dubbed Facebook Friends Mapper that allows them to crawl Facebook Hidden Friends list just in a click. Facebook users can protect their privacy by setting the “privacy level” for every information related their profile or content they post online. Users can decide to completely set as private the information in […]
More than four million smart meters and similar devices worldwide are open to cyber attacks due to the security issued in the Open Smart Grid Protocol. The Open Smart Grid Protocol (OSGP) is a family of specifications published by the European Telecommunications Standards Institute (ETSI) that are implemented today by more than four million smart […]
According to data provided by British law enforcement, at least a 25 percent of organised criminals in the country is converting themselves to cybercrime. Cybercrime is becoming even more attractive to traditional crooks, including violent offenders. According to data provided by British law enforcement traditional crimes were continuing to fall while the number of online crimes […]
Every WordPress Plugin or theme that used the genericons package is potentially vulnerable to a DOM-based XSS vulnerability. Experts at the Sucuri firm have discovered that any WordPress Plugin or theme that leverages the genericons package is affected by a DOM-based Cross-Site Scripting (XSS) vulnerability due to an insecure file included with genericons. The experts explained that among […]
Certain versions of common drug infusion pumps are affected by numerous remotely exploitable vulnerabilities that could not open the doors to hackers. We discussed several times about the opportunity to hack medical devices and the needs of security by design for these objects. In 2012 the US Government Accountability Office (GAO) published a report that highlighted the necessity to secure […]
You can find a manual on how to hack drones online, simply searching on Google. This can lead to severe problems and negative consequences. Drones have become truly popular, due to the multiple benefits that they offer. In the military, drones have been in use thanks to their versatility, their low cost and of course […]
Many Uber customers are reporting unauthorized rides paid through their accounts, the company excludes a data breach, but suggested a password reset. In March, media agencies reported that the popular Uber service was hacked by cyber criminals, security experts discovered al least two different vendors offering stolen Uber customer logins in a black market on […]
Hackers belonging to the Anonymous collective hacked the website of the World Trade Organization (WTO) and leaked personal data of thousands of officials. Hackers belonging the Anonymous collective compromised the website of the World Trade Organization (WTO) and leaked its database containing personal data of its members. The stolen data are related to personnel of […]