A group of hackers claiming to be members of the collective Anonymous has released online a lot of 13,000 passwords and credit cards for popular websites. Hackers claiming to be members of the popular group of hacktivists Anonymous have leaked more than 13,000 alleged credentials for some popular websites, including Amazon, Playstation Network and Xbox Live. The […]
Members of the hacking group Lizard Squad, which have paralyzed the networks of Xbox live and PlayStation PSN, now have targeted the Tor network. The hacking collective Lizard Squad that has paralyzed the Play Station Network and Xbox live networks at Christmas now seems to concentrate its efforts on the popular anonymizing Tor network. In time I’m […]
Hackers belonging to the Lizard Squad team have taken down at Christmas the online networks of both Microsoft Xbox Live and PlayStation network (PSN). The Lizard Squad hacking team has taken down the online gaming networks of both Xbox Live and PlayStation at Christmas. The attack does not come unexpected, unfortunately, the group Lizard Squad had already […]
Chinese hackers brought down all major Afghanistan Government websites by hacking an official CDN network used in the country. The experts of the ThreatConnect Intelligence Research Team (TCIRT) recently reported the operation, dubbed Operation Helmand, run by a group of Chinese hackers that attacked the entire Afghan government web network. The hackers allegedly used a targeted cross-site scripting […]
Security experts involved in the investigation on the JPMorgan breach revealed that hackers exploited the lack of 2FA to compromise a server in the network. JPMorgan suffered months the biggest U.S. banking breach of all time, and now The New York Times provided more information on the case citing sources close to the experts involved in the […]
A cluster of Tor servers suffered an unexplained outage just after the warning of the Tor project. Only certainty is someone physically accessed servers. Recently the experts at the Tor project issued a warning of a possible cyber attack against the Tor network through the seizure of the Directory authorities that can âincapacitateâ the overall architecture. The experts […]
The Tor network could be seriously impacted by the seizure of directory authorities operated by law enforcement, despite it is a precious resource for all. The overall architecture of Tor network relies on nine directory authorities locate in the Europe and United States. The servers working as directory authorities provide a signed list of all the […]
USBdriveby is a device designed to quickly and covertly install a backdoor and override DNS settings on an unlocked machine via USB. The security experts Samy Kamkar (@SamyKamkar) has proposed a very interesting way to compromise an unlocked computer and deploy a backdoor on it simply by using a pre-programmed Teensy microcontroller. The cheap ($20) […]
Security researchers at Google have discovered several serious flaws affecting the NTP protocol, which are remotely exploitable by the attackers. Security experts at Google have uncovered several serious flaws in the Network Time Protocol (NTP), including several buffer overflows that are remotely exploitable. The Network Time Protocol is a networking protocol for clock synchronization between […]
German researchers have announced the discovery of news security flaws in SS7 protocol that could be exploited by an attacker to spy on private phone calls. A team of German researchers has discovered security flaws that be exploited by a threat actor to spy on private phone calls and intercept text messages on a large […]