A group of researchers from TrapX Security demonstrated how to infiltrate home networks by compromising a Nest thermostat. We already discussed in the past of the risks related to cyber attacks against IoT devices, these smart objects are everywhere, including our homes, so they represent a privileged target for hackers. Security experts from TrapX Security demonstrated how […]
Researchers hack NSA’s website with only $104 and 8 hours of Amazon’s cloud computing power using the #FREAK vulnerability A team of researchers demonstrated that it is possible to exploit the FREAK vulnerability to hack the official NSA website by using 8 hours of Amazon’s cloud computing power and spending only $104. The researcher made […]
Air Force Exchange Service (AAFES) confirms that following the SIGA data breach, confidential data belonging to US military personnel were exposed. A bad news for the US military, the Army and Air Force Exchange Service (AAFES) confirms that, following a the data breach of the German telecom company SIGA Telecom and an AAFES contractor occurred on March 5, […]
According to a security advisory published by Microsoft all supported versions of Windows are affected by the recently discovered FREAK vulnerability FREAK is major security SSL/TLS vulnerability recently discovered that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of legitimate and secure websites. The critical […]
The Singapore-based company AdNear is using a fleet of commercial drones to determine users’ location and deliver hyper-targeted ads. Drones that spy on unaware people, a nightmare come true, apparently nothing new considering that it is a common practice of law enforcement and Intelligence agency. The bad news is that also a few advertising companies are also […]
FREAK, a new major security flaw that left users of Apple and Google devices exposed to MITM attack while visiting supposedly secure Websites. IT industry is facing with a new major security SSL/TLS vulnerability that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of […]
D-Link routers contain a vulnerability that could be exploited by attackers to get root access remotely and run several attacks. Once again security experts have found security vulnerabilities in home routers, these devices are a privileged target of cyber criminals that exploit the flaws in the software they run for several purposes. This time the flawed routers […]
A British hacker has found two Blu-Ray-borne attacks that could be run to infect machines, a technique that remind the method used by the Equation Group. Security expert Stephen Tomkinson from NCC Group has discovered a couple of vulnerabilities in the software used to play Blu-ray discs. The exploitation of the flaw could be used to implant […]
A cyber resilience approach: the need to become cyber resilient is very essential because eliminating risks completely is impossible. Hacking emerged as a geeky, tech-oriented culture that was a little mischievous, but ultimately was about programming and finding faults or bugs in the code. It has evolved over time to become a criminal activity. The […]
A security expert discovered a Remote Code Execution zero-day vulnerability in Seagate Network Attached Storage (NAS) systems. A critical zero-day vulnerability affects Network Attached Storage (NAS) device software produced by the Seagate firm. The vulnerability was discovered by the security researcher OJ Reeves on October 7 and reported to Seagate that still hasn’t fixed the zero-day. The Seagate […]
Security / September 03, 2025