A security researcher reported to Tesla company a series of security issues related with S model that could be exploited to locate and unlock the vehicles. Hackers are able to remotely locate or unlock the Tesla Motors electric vehicles, the news is curious but it isn’t a novelty. Car hacking was largely discussed in the last […]
Israeli researcher Danor Cohen has discovered a security flaw in WinRAR, IntelCrawler confirmed was exploited in cyber espionage campaign. WinRAR is a popular shareware file archiver and data compression utility, as usual these applications are targeted by hackers because their penetration level. Recently the Israeli researcher Danor Cohen has discovered that a security flaw in WinRAR is being exploited in a series […]
The last report issued by Chinaâs Computer Emergency Response Team (CNCERT) blames US for the majority of malware based attacks against the Chinese systems. There was once a dreaded China that violated the systems across the world and all the countries accused its cyber units to conduct aggressive and reckless hacking, today’s world politics discovered that US […]
GCHQ infiltrated German firms while NSA obtained a court order to spy on Germany and collected information about the chancellor in a special database. A new report published by Der Spiegel agency based on the document leaked by Edward Snowden has revealed that the National Security Agency (NSA) and the British Government Communications Headquarters (GCHQ) spied on private […]
Researchers at ReVuln firm demonstrated how to exploit the last firmware update for Philips SmartTV to steal user’s cookies and other sensitive data. The excellent team of researchers at ReVuln firm has published another interesting analysis on the possibility to hack Philips SmartTV to steal user’s cookies. The news is disconcerting and raise serious concerns for user’s […]
More than 12,000 phishing sites analyzed by Netcraft are hosted on compromised WordPress installations, the websites were used also to serve malicious code. Netcraft internet services company published a statistic which shows that nearly 12,000 WordPress instances were compromised in February, the attackers used the popular CMS to conduct phishing campaigns against targeted family of users, […]
Security experts at FireEye uncovered a cyber espionage campaign based on multiple MH370 themed spear phishing emails. Security researchers at FireEye have revealed a link between a recent spear phishing campaign on Malaysian Airlines flight MH370 and the attacks conducted by some advanced persistent threat (APT) attackers. The mysterious skyjacking of the Boeing 777-200 aircraft of Malaysian Airlines, flight MH370, is considered one of the events […]
RAND nonprofit and Juniper Networks firm published an interesting research on the evolution of the offer in the underground market. The cybercriminal underground is a prolific market able to provide any kind of tools and services for illicit ecosystem, one of the most requested articles is the exploits to compromise Internet usersâ machines. Russian-language forums are […]
Symantec experts demonstrated how to rob ATMs using a mobile device and sending a couple of SMS. Cybercriminals are increasing sophistication of attacks. What will happen after that Microsoft will stop supporting the Windows XP operating system on 8th April? The question was approached by numerous security experts on different media. The impact could be […]
Microsoft issued a security advisory for the presence of a zero-day vulnerability in Microsoft Word products which allows a remote code execution. Another zero-day vulnerability is threatening the Microsoft world, the news was issued by Microsoft through an official security advisory (CVE-2014-1761). The vulnerability is present in Microsoft Word product, it allows a remote code execution that can […]