A new alarm on car hacking issued by the security community, the white hat Jonathan Brossard warns cars can be hacked on the road remotely. Car hacking is possible, I have proposed different works presented by security experts that demonstrate how to compromise modern vehicles with cheap environment. Modern cars have a huge quantity of components connected […]
A Portuguese security expert has uncovered the Cupid attack, a new Heartbleed attack vector which can impact Android devices, enterprise wireless networks and other connected devices. Cupid is the name of the new Heartbleed attack method recently proposed by Portuguese security researcher Luis Grangeia, unlike the original version of the attack, which took place on TLS connections over TCP, […]
Security Experts discovered a new attack method to defeat Secure Boot security mechanism of the UEFI (Unified Extensible Firmware Interface). The Secure Boot security mechanism of the UEFI (Unified Extensible Firmware Interface) can be circumvented on around half of PCs that use it, security researcher Corey Kallenberg from nonprofit research organization Mitre has demonstrated it at […]
Sporting events are an excellent scenario for hacktivists, protest against the World Cup in Brazil are increasing and hackers announced a major cyber attack. The football World Cup in Brazil 2014 is coming soon, the infrastructure used for the event are a prime target for each category of bad actors, state-sponsored hackers intent on cyber espionage, cyber criminals […]
Security researchers at Sucuri firm have discovered multiple serious vulnerabilities in the popular ‘All In One SEO Pack’ plugin for WordPress. WordPress in one of most targeted CMS platforms due its large diffusion, attackers are able to compromise victim instance exploiting flaws in outdated version or in vulnerable plugins . The Netcraft internet services company, in […]
Experts at iSight issued a report describing the most elaborate net-based spying campaign organized by Iranian hackers using social media. Iranian Hackers use a network of fake accounts (NEWSCASTER network) on principal social media to spy on US officials and political staff worldwide, this is reported in an analysis done by iSIGHT Partners. A few days ago […]
Encryption Tool TrueCrypt shuts down mysteriously, a message on the official SourceForge-hosted page is encouraging users to adopt Microsoft Bitlocker. TrueCrypt, another myth is falling down? Many TrueCrypt users have had a nasty surprise visiting the TrueCrypt page at SourceForge, the page content warns visitors that the open source encryption software is not secure and that its […]
Researchers at SEC Consult Vulnerability Lab discovered that Nice Recording eXpress lawful intercept software contains numerous flaws, including a backdoor. Nice Recording eXpress voice-recording package software used by law enforcement to intercept communications of suspects under investigation contains various flaws, this is the discovery of security researchers at SEC Consult Vulnerability Lab. The researchers have recently published an […]
Spotify company is investigating unauthorized access to its systems and internal company data. Android users urge to update the app and change the password. The popular Music streaming service Spotify is the last illustrious victim of hackers. The Swedish company today has issued an advisory to inform its the users of its Android app that it has suffered a […]
Unencrypted cookies leave WordPress accounts exposed to hijacking on insecure networks, even if the two-factor authentication is enabled. WordPress administrators must be aware that it is quite easy for hackers to hijack their web site if they login from the same WI-Fi connection (e.g. From a public place) even if it is protected by two-factor authentication, . […]