Syrian Electronic Army hacked BlueHost, Hostgator, Justhost, FastDomain and HostMonstor companies because they hosted websites managed by terrorists. Syrian Electronic Army (SEA) is an unstoppable cyber brigade that once again gained the attention of the principal media for a clamorous hack. SEA is a popular group of hacked aligned with Syrian President Bashar al-Assad, is the past […]
The New York Times reported that a group of hackers is interfering with the activities made through social media by members of the ISIS group. According to The New York Times hackers are targeting accounts used by ISIS members for propaganda and recruit new sympathizers. A group of hackers using the pseudonyms of TouchMyTweets, The Doctor and IS Hunting are targeting suspected ISIS […]
Iran is improving its cyber capabilities faster than experts ‘would have ever imagined’ and increased cyber-security spending 12-fold since2013. The British Business Insider published an interesting post on the Iranian cyber capabilities, according the experts the Government of Teheran is improving expertise in the cyber domain faster than experts ‘would have ever imagined’. Iran is […]
The Chinese Government is suspected for the large-scale distributed denial of service (DDoS) attack that hit the popular GitHub website. The popular coding website Github suffered a large-scale distributed denial of service (DDoS) attack that lasted more than 24 hours starting from Thursday night. The attack exploited the redirection of users who were connecting to many other websites on the […]
Security experts at Minded Security firm have recently discovered a flaw in the popular networking library for iOS and OS X AFNetworking. The researchers Simone Bovi and Mauro Gentile at the security firm Minded Security discovered a flaw in the popular networking library for iOS and OS X AFNetworking. The researchers found the flaw while were […]
Secunia firm issued its annual report on vulnerabilities exploited in 2014 in most popular software, a document which includes key figures and facts. Secunia has recently released its annual study of trends in software vulnerabilities, an interesting report that highlights the impact of the presence of flaws in common software and provide useful details on the […]
Bar Mitzvah is the name of a new attack on RC4-Based SSL/TLS encryption that allows disclosure of sensitive data by exploiting a 13-Year-Old Vulnerability. Both Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS) cryptographic protocols rely on the Rivest Cipher 4 (RC4) algorithm to encrypt data transfers. The problem is that the […]
The last collection of top-secret slides leaked by Snowden and disclosed by media agencies reveal the hacking capabilities and platforms of Canadian CSE. The last collection of top-secret documents leaked by the whistleblower Edward Snowden, and published by The Intercept and the Canadian Broadcasting Corporation, leaked documents reveal the Canadians are a dab hand at cyber-stuff, […]
Experts of the Project Zero have disclosed a proof-of-concept for the exploitation of a default setting in Windows 7, 8.1 that allow privilege escalation. A new security issue threatens users of Windows 7 and 8.1, this time experts are warning about a default setting in both OSs that could allow local users to elevate privileges […]
Israeli Researchers have defined a new exfiltration technique dubbed BitWhisper that is based on the heat emissions and built-in thermal sensors. According researchers at the Ben Gurion University in Israel, by detecting the heat from one computer to an adjacent computer, is possible to establish a channel that can claiming can facilitate the spread of keys, malicious […]