Researchers at Context Information Security have demonstrated that it is very easy to monitor IoT devices that implement the Bluetooth Low Energy protocol. The Internet of Things is enlarging our surface of attack, it’s not a mystery, track us is becoming even more easy as demonstrated by a group of researchers at Context Information Security. The team […]
Security experts at FireEye have published a report that details the cyber threats targeting various sectors in the Nordic countries. According to FireEye, threat actors targeted strategic industries (i.e. aerospace and defense, energy, health and pharmaceuticals, and shipping), government and defense agencies searching for political, economic and military intelligence. Experts believe sophisticated threat groups could be […]
The group of hackers known as Yemen Cyber Army has hacked the computer systems at Saudi Arabia, they control also Interior Ministry and Defense Ministry. The group of hackers known as Yemen Cyber Army has hacked the computer systems at Saudi Arabia. The Hacking crew compromised the website, servers and databases belonging to the Saudi Arabia’s Foreign, […]
Hi-tech car thieves use ÂŁ30 jamming devices in car parks, the devices allow them to bypass car coding and reprogramme vehicles before driving off in them. Car thieves are becoming even more technological, we have read many news regarding hackers that designed specific solutions to hack car through the internal CAN bus or simply to unlock car doors […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Chinese hackers hit Penn State University, 18K people impacted ISIS â Cyber Caliphate hackers are threatening Electronic War Use privacy software if you want to be safe from Facebook, […]
Panda Security firm released a report regarding a hacking campaign dubbed “Operation Oil Tanker: The Phantom Menace” that targeted oil tankers. Security researchers at Panda Security have released a report on a hacking campaign dubbed “Operation Oil Tanker: The Phantom Menace” that targeted oil tankers. According to Panda Security the attacks on oil cargos began in August […]
Cyber criminals have hacked the popular online dating websites Adult FriendFinder leaking the highly sensitive sexual information on a forum in the dark web. The popular dating website Adult FriendFinder was hacked, it suffered a massive data breach that potentially exposed personal details of nearly 4 Million users. According to Channel 4 News, the information was offered […]
Today I was contacted by many friends and followers because they are disappointed regarding a voting proposed by the Infosecurity Europe. http://blogs.infosecurityeurope.com/europes-most-popular-security-blogs-vote-now/ You know my daily effort spent in cyber security, I have thousand people that everyday reads my posts and share them, but evidently it is not enough because I’m out of their business. […]
EBay has recently fixed a reflected file download vulnerability discovered by the security researcher David Sopas at WebSegura. Ebay is among the web services most targeted by cyber criminals and phishers, over the years, security experts have spotted an impressive amount of attack exploiting techniques more or less sophisticated. Almost every attack relies on social engineering, attackers […]
Two security researchers demonstrated that the Android Factory Reset process fails to wipe private data from Android mobile devices. Researchers at Cambridge University, Laurent Simon and Ross Anderson, revealed that more than half a billion Android devices could have data recovered due to flaws in the default wiping process. The experts have analyzed Android 21 devices […]