A security researcher disclosed a serious issue on Instagramâs Android Application which could be exploited by an attacker to impersonate a victim. A security issue related to Instagram Mobile App for Android expose the users’ account to serious risks of data breach. A security researcher discovered that the Instagram Mobile App is affected by a Hijacking vulnerability which could be […]
Two security experts will present at the next BlackHat conference how to exploit cloud services to build Money-Mining Botnet. Cloud computing is becoming the paradigm most abused by cybercrime, cloud architectures represent privileged targets of cyber criminals that desire to steal data they contain or to abuse their resources to conduct cyber attacks. Two researchers, Rob […]
Hackers steal user contact information and other data from a database of the European Central Bank website in an attempt of extortion. Financial institutions are under attack, the number of cyber attacks against banking industry is increasing constantly, last malicious campaign discovered in order of time is the Operation Emmental. A few days ago, bad […]
The Russian government has launched a public competition, reserved to Russian entities, offering $111,000 to break Tor encryption. As anticipated in my previous post, law enforcement agencies and intelligence all over the world are investing to de-anonymize users in the deepweb, and in particular on Tor networks. Hacking Tor is a goal for many Intelligence agencies as […]
The co-creator of the Tor network confirmed that the Tor Project team is working to identify and fix the bug announced by researchers at Carnegie Mellon. Tor network is a system designed to anonymize user’s experience on the web, allowing the publishing of content in the part of web non indexed by search engines, dubbed DeepWeb. A […]
Security experts at Incapsula are observing a surge in the used of fake Googlebots to launch and carry out application-layer DDoS. Googlebots crawl websites are the software used to index and rank the content of websites for the popular search engine. It’s not a mystery that the visits of Googlebots are not considered a possible indicator […]
Security experts at Sucuri form have observed a surge of cyber attacks against WordPress website which are using not updated version of MailPoet plugin. A large scale attack has hit more than 50,000 websites, the attacker exploited a recently patched vulnerability in a popular plugin for the WordPress CMS. Early July, experts at security firm Sucuri discovered […]
A researchers at the Exodus Intelligence firm has discovered a series of zero day vulnerabilities in the popular Tails Linux-based distribution. A researcher at Exodus Intelligence has discovered critical zero-day vulnerabilities in the popular Tails live operating system. Tails is considered by security experts an indispensable tool to preserve the privacy and security of users that intend to […]
Indexeus is a new search engine that indexes user account information acquired from data breaches, including hackers’ accounts stolen in the underground. A new search engine for underground hacking dubbed Indexeus has been launched, it retrieves all the available information on user account acquired from hundreds recently data data breaches. The data collected includes information on malicious hackers […]
Apple has worked hard to make iOS devices reasonably secure but hidden services could be exploited to steal every user’s data in a stealthy way. Have you tried to enumerate the functionalities and services in your Apple iOS? You’d be surprised to find that numerous hidden features and services are not documented, some of them […]