The #OpIsrael is destined to make the history, for the first time a collective decided to conduct a large-scale cyber attack against a state, despite the campaign started a few months ago it has reached its peak on 7th April when various organizations of hacktivists targeted Israele Web sites with powerful DDoS attacks and in some cases defacing them […]
In various articles I wrote on the large diffusion of botnets and the capabilities of malicious agents to use as spread channel the social media platforms or popular applications. The diffusion and management of a botnet architecture has never been so easy, the underground offer covers every need and provides advanced customization services. Security expert […]
The day is near, the group of hackers belonging to the collective of Anonymous declared in a unanimous way, war on the state of Israel, promising a sensational action on April 7th. The popular group of hacktivists started in the last months a campaign dubbed #OpIsrael  to  protest against Israeli bombing of Palestinian territory, the hackers have […]
Itâs not a surprise South Korean security experts suggest that the North Korea military is training an elite force of âcyber warriorsâ to involve in cyber attacks against South institutions and companies. The South intelligence revelations follow continuous menaces of North Korea against U.S. Forces located in the Far East, the dictator Kim Jong-UN enhances […]
Researchers at Hacktive Security, an independent security consulting company, have demonstrated how much insidious could be a so a simple and crimeless large scale application. We are in the digital era, everything is connected to the large networks and applications benefit of even more complex devices that deeply interact with the owner, in this scenario […]
Israel is considered by various group of hacktivists an enemy state to fight, for this reason they decide a joint operation to start on April 7th as part of #OpIsrael.  The attack started in 2012 against the protest against Israeli bombing of Palestinian territory, hacktivists are expressing full solidarity with the Palestinian people, the interest is high […]
Many times we discussed about large diffusion of mobile devices and of related cyber threats, around a months ago I presented the case of HTC mobile that revealed 18 million devices commercialized by Taiwanese company had security flaws that could exposes users to serious risks, in particular the bugs could allow the theft of information […]
Sky is a brand names for satellite television providers and channels, owned or partially owned by News Corporation an American diversified multinational mass media corporation headquartered in New York City, United States. The IT specialist, Fabio Natalucci, published a blog post related a vulnerability on the Italian web site that allows an attacker to perform a brute force attack […]
The excellent researchers at ReVuln, Luigi Auriemma and Donato Ferrante, presented at Black Hat Europe 2013 in Amsterdam a way to convert local bugs and features in remotely exploitable security vulnerabilities by using the popular EA Origin 3 platform as an attack vector against remote systems. EA Origin is one of the biggest gaming related digital […]
As usual I was reading the news on The Hacker New security portal when a post attracted my attention, another security issue related to an IT giant, Google. The Indian penetration tester Ansuman Samantaray discovered a security flaw in Google drive that exposes millions of Google users to threat of phishing attacks. Too bad that Google […]