Thousands of WordPress based websites have been hacked to compose a global scale botnet that is performing powerful DDOS attacks. I start the post with recommendations, if you are a blogger using WordPress don’t waste time and update it and all installed plugins to the latest versions! Have you done it? OK, now I can explain you what it is […]
Security experts at FireEye discovered the Operation DeputyDog against Japanese entities that exploits Zero-Day (CVE-2013-3893) recently announced by Microsoft. FireEye announced the discovery of the cyberespionage Operation DeputyDog leveraging the recently announced zero-day CVE-2013-3893. FireEye and Kaspersky are the companies most active in the analysis of large espionage campaign that governments and hackers are conducting against strategic targets. According the analysis based on FireEye […]
Chaos Computer Club claims to have bypassed the biometric security technology Apple TouchID by making a copy of a fingerprint photographed on a glass surface. Hackers members of the Chaos Computer Club claim to have defeated Apple TouchID fingerprint sensor for the iPhone 5S, just after the start of its sale to the public. The Chaos Computer Club in […]
A second iOS 7 Lockscreen vulnerability has been found a few days the first one was fixed by Apple. This time attackers can makes call from a locked iPhone. A new iOS 7 Lockscreen vulnerability has been discovered, the flow allows attackers with physical access to the phone to make calls, including international calls and calls to […]
iOS 7 vulnerability lets ill-intentioned with physical access to bypass iPhone’s Lockscreen to access mobile. Jose Rodriguez has found a lock screen vulnerability in iOS 7, last version of popular Apple mobile OS system. Mr Rodriguez is a 36 year old soldier living in Spain’s Canary Islands, has found a security vulnerability in iOS 7 that allows […]
A team of researchers developed an hardware trojan undetectable to most detection techniques raising the question on need of proper hardware qualification. A Team of researchers conducted a study on a stealthy Dopant-Level Hardware Trojans, an insidious menace that could have a dramatic impact on production processed of chips in every sector. The team composed […]
Microsoft announced to be aware of a new IE Zero Day vulnerability (CVE-2013-3893) that affects Windows browsers IE 8 and IE 9 recently targeted by hackers. Microsoft announced to be aware of the presence of a zero-day vulnerability (CVE-2013-3893) in its browser IE. Windows browsers IE 8 and IE 9 are affected by serious zero-day vulnerability recently targeted […]
Belgacom hack, the telecommunications company found evidence of digital intrusion in the company systems, many experts believe in a state-sponsored attack. Belgacom hack, the largest telecommunications company in Belgium and primarily state-owned, has announced that its IT infrastructure has suffered a cyber attack malware based. The attackers hacked company IT systems and infected with unknown Malware. According first […]
It is very easy to hack the Nasdaq according the security expert Kolochenko that reported numerous vulnerabilities in the official website of the exchange. Just 10 minutes could be sufficient for an attacker to hack the Nasdaq Stock Market, this is the alert provided by Ilia Kolochenko, head of Swiss information security company High-Tech Bridge. The security expert […]
In an Irish court the FBI Supervisory Special Agent Donahue revealed that FBI had control of the Freedom Hosting company to investigate on child pornography. FBI admitted publicly that the Bureau had compromised the Freedom Hosting, probably the most popular Tor hidden service operator company. The news confirms the suspects raised after that a group of Security […]