A security bug in the WordPress plugin WP-Slimstat could be exploited by attackers to discover a âsecretâ key and use it to run blind SQL Injections. More than one million WordPress sites are potentially vulnerable to SQL injection attacks due to the presence of a critical flaw in the popular plugin WP-Slimstat. WP-Slimstat is an analytics plugin for […]
The Ramnit botnet has been shut down in a joint effort by the Europol and the security firms Symantec, Microsoft, and Anubis Networks. Another success For the Europol and its allies Microsoft, Symantec, and Anubis Networks. The organizations in a joint effort have shut down command and control servers of the popular Ramnit botnet. The Joint Cybercrime […]
Alleged Hacker belonging to the hacking crew Lizard Squad run a DNS hajacking attack against the Google Vietnam domain. A nasty surprise for Internet users who visited the Google Vietnam website that was presented with a picture of a man taking a selfie, along with a message that claimed the website site was hacked by the […]
CVE-2015-0240 is a critical security flaw in Samba that resides in the smbd file server daemon and can be exploited by a malicious Samba client remotely. Linux administrators urge to update their systems due to the discovery of a critical vulnerability the open source Linux-and-Windows-compatibility software Samba. The vulnerability in Samba, coded as CVE-2015-0240, affects versions […]
Samsung smartTV send unencrypted voice recognition data and text information across the Internet without encrypt it, allowing hackers to capture them. A few days ago I was one of the first to publish the news about the Samsung privacy policy that reports smartTV are sending user voice data to third parties. “Samsung SmartTV transmits data […]
The Us Justice Department’s proposal to grant FBI Rule 41Â specific hacking rights is under high scrutiny. While the amendment is being reviewed, the Advisory Committee on Criminal Rules will consider public objections, including a letter from Google. The amendment to the Federal Rule of Criminal Procedure 41 (Rule 41) would expand jurisdiction for judges to […]
A group of researchers has proposed a new technique dubbed PowerSpy to track mobile usersâ location by analyzing data related to the power supply. AÂ group of researchers at Stanford University and the Israeli defense company Rafael has discovered a way to track mobile devices by analyzing the power supply. The experts have proposed a technique […]
A new report published by Verisign provides useful data related to the recent evolution of DDoS attacks and the services that offer them. DDoS attacks are even more dangerous for every organization that exposes its resources and services on the Internet, recent attacks against Sony PSN network and XBox live service demonstrate it. DDoS attacks despite […]
The Founder of Shodan John Matherly was revamping the SSH banner when discovered a large number of devices that share same SSH keys. The Founder of Shodan, John Matherly, has conducted in December 2014 a personal research discovering that more than 250,000 routers used in Spain and deployed by Telefonica de Espana, and thousands more used in other […]
Telephone DDoS attacks are on the rise, the  criminal group known as âTNTâ gang has released a new hardware tool in the underground ecosystem. The IntelCrawler cyber threat intelligence company has discovered a new advanced tool, dubbed ‘TNT Instant Up’, for Telephone Denial of Service attacks (TDoS). TDoS is a common practice in the criminal underground, it consists in flooding […]