Researchers at Trend Micro discovered a new Adobe Flash Zero-Day used in Pawn Storm Campaign Targeting Foreign Affairs Ministries across the world. Once again Flash in the headlines, beware next emergency Flash Player update is critical for everybody as explained by the experts at Trend Micro. The researchers at the security firm explained that the update […]
Two researchers from the French Intelligence Agency ANSSI discovered that hackers can control a mobile device remotely using the personal voice assistant. A team of experts from French Intelligence Agency ANSSI has discovered that a hacker can completely control mobile devices from as far as 16 feet away. How is it possible? The hackers have discovered a […]
The Chinese jailbreaking team Pangu has just released a software (iOS 9 jailbreak) that allows Apple users to jailbreak their mobile devices using iOS 9. Every time a new release of the popular Apple iOS is presented, hackers and experts start the competition to jailbreak it. One of the most active hacking crew in this […]
Researchers at Trend Micro have issued a new report on the Japanese Cybercrime Underground, a growing criminal community with his characteristics. Cybercrime underground is a growing and prolific industry that knows no crisis as demonstrated by the numerous reports issued by principal security companies and law enforcement. In the past we have analyzed criminal most […]
In March I presented the PoC of a computer-frying Killer USB pendrive designed by the Russian researcher, now the USB Killer 2.0 is arrived! Do you remember the killer USB? In March I presented the proof-of-concept computer-frying Killer USB pendrive designed by the Russian researcher with the pseudonym “Dark Purple.” Dark Purple works for a company that develops and manufactures electronic components, the […]
European Aviation Safety Agency European Aviation confirmed the concerns about the Airplane hacking. Hackers could easily infiltrate critical systems. On October 8, 2015, the director of the European Aviation Safety Agency, Patrick Ky revealed he has hired consultant, which is also a commercial pilot, who was able to exploit vulnerabilities in the Aircraft Communications Addressing […]
For the first time, hackers have been arrested in China by law enforcement at the behest of the US government. Is it true cooperation? It is probably the first time that Chinese authorities have arrested hackers in China following a request of the US Government. Two weeks, before the visit of the Chinese President Xi Jinping in the […]
Cyber Threat Summit 2015 – Study on criminal activities in the dark web. “The Dark web – Why the hidden part of the web is even more dangerous?” Also, this year I have participated as a speaker to the Cyber Threat Summit 2015 held in Dublid, an event aimed at senior CISO level delegates and senior executives […]
The Dow Jones firm confirmed to have suffered a data breach, payment card and contact info for less than 3,500 users have been exposed. At the end of the last week, the CEO of Dow Jones & Co disclosed a data breach affecting 3,500 people in a letter to customers. Dow Jones is a media company owned […]
A group of researchers has demonstrated that the cost of breaking the SHA-1 hash algorithm is lower than previously estimated. The SHA-1 is still one of the most used cryptographic hash algorithm, but bad news for its supporters, a New Collision Attack Lowers Cost of Breaking it. The news is worrying, the cost and time […]