At the recent DEF CON hacking conference penetration testers demonstrated that Samsung smart fridge leaves Gmail logins open to attack. Once again Internet of Things raises security concerns, this time security researchers have discovered a way to steal users’ Gmail credentials from a Samsung smart fridge. At the recent DEF CON hacking conference, they presented a […]
Security experts have no doubt about the evolution of the car hacking, we are just at the beginning and we need improve cyber security urgently. The last weeks were very interesting for the security experts interested in the cyber security of modern connected cars. People is even more curious about the car hacking following the […]
Thousands Britons have been exposed in massive new data hack, their personal and financial data are easy to access online with a simple query on Shodan. Thousands of Britons are exposed to cyber crime after the content of their PC was exposed on the Internet by Shodan, a website dubbed the “Google for hackers.” The leaked […]
Security experts at FireEye uncovered a cyber espionage campaign that targeted organizations in India and the Tibetan activists. Security firm FireEye revealed an intense activity of hackers based in China particularly interested in entities and organization linked to the Indian Government as well as in information on Tibetan activists. Also in this case we are dealing […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Dark marketplaces raked from $300,000 to $500,000 a day How to hack a Parrot drone on the fly How BitTorrent could let lone DDoS attackers bring down big sites […]
At the last the Chaos Communication Camp, held in Zehdenick, Germany experts demonstrated how to hack the Iridium network and eavesdrop its pager traffic. At the last edition of the Chaos Communication Camp held in Germany the organizers distributed 4500 rad1o badges, powerful devices running a software that could be used to intercept satellite traffic from […]
The hackers behind that data breach of the Ashley Madison website have released another dump of 20 GB and experts are publishing their analysis on it. The recent hack of the adultery website Ashley Madison is attracting the attention of the media, after the disclosure of a second dump of data the security experts started their […]
A security researcher revealed that BMW was aware of the mobile app vulnerability that allows hackers to run the Ownstar attack. At the recent DEF CON conference the popular security researcher Samy Kamkar presented Ownstar, a $100 gadget that allows to hacks GM Cars. The Ownstar tool allows to locate, unlock, and start a car who […]
Experts discovered that the sandbox vulnerability affects all apps that use the managed app configuration setting in devices that run older versions. Kevin Watkins, a security researcher from Appthority, argues that users without iOS 8.4.1 are affected by the sandbox vulnerability, CVE-2015-3269. The flaw affects all apps that use the managed app configuration settings, meaning that […]
Researchers Roel Verdult and Baris Ege, revealed that popular cars, including Ferrari and Porsche,which use Megamos Crypto transponders can be easily stolen. The level of interest on Car hacking is maximum following the recent hack of the Fiat Chrysler Jeep, news of the day is that a team or experts since 2012 is aware of the presence of security flaws […]