Today I was contacted by many friends and followers because they are disappointed regarding a voting proposed by the Infosecurity Europe. http://blogs.infosecurityeurope.com/europes-most-popular-security-blogs-vote-now/ You know my daily effort spent in cyber security, I have thousand people that everyday reads my posts and share them, but evidently it is not enough because I’m out of their business. […]
EBay has recently fixed a reflected file download vulnerability discovered by the security researcher David Sopas at WebSegura. Ebay is among the web services most targeted by cyber criminals and phishers, over the years, security experts have spotted an impressive amount of attack exploiting techniques more or less sophisticated. Almost every attack relies on social engineering, attackers […]
Two security researchers demonstrated that the Android Factory Reset process fails to wipe private data from Android mobile devices. Researchers at Cambridge University, Laurent Simon and Ross Anderson, revealed that more than half a billion Android devices could have data recovered due to flaws in the default wiping process. The experts have analyzed Android 21 devices […]
CareFirst BlueCross BlueShield fall victim of a major data breach, personal information belonging more than one million individuals could have been exposed. Health insurer CareFirst BlueCross BlueShield is notifying more than one million individuals that it was the victim of a data breach which may have exposed personal information used by attackers to gain limited, […]
Researchers have discovered a new TLS vulnerability dubbed LogJam that open a large number of online services to cyber attacks. Logjam is the name assigned to a new vulnerability that affects the Transport Layer Security (TLS) protocol putting a large number of online services at risk. Logjam vulnerability can be triggered through man-in-the-middle (MitM) attacks to […]
A simple vulnerability has been uncovered in the NetUSB component, millions of modern routers and other IoT devices are exposed to the risk of cyber attacks The security expert Stefan Viehbock from SEC Consult Vulnerability Lab has reported a critical vulnerability (CVE-2015-3036) that potentially affects millions of routers and Internet of Things devices using the KCodes […]
The Bundestag has become the target of a significant cyber attack, hackers tried to compromise the internal network of the German Parliament. The German parliament Bundestag has officially confirmed media reports about a hacking attack that hit the Institution last week. “There has been an attack on the IT systems of the Bundestag,” spokesman Ernst […]
A URL Spoofing flaw affects the Apple Safari browser. It could trick users into visiting malicious websites despite they are accessing to legitimate URLs. A serious security vulnerability affects the Apple Safari browser, the flaw could be exploited by attackers to trick Safari users into visiting malicious websites while are trying to surf on legitimate websites. […]
The penetration tester Thiebauld Weksteen has published an interesting analysis to explaine the importance of robots.txt for the hacking activities. Thiebauld Weksteen, a penetration tester from Melbourne is advising system administrators that robots.txt can give precious details to hackers, when it comes to attacks, because robots.txt as the capability to tell search engines which directories […]
The UK Government is giving GCHQ, Intelligence services and law enforcement full hacking powers. People are scared by a law that gives GCHQ the immunity. New legislation exempting police, GCHQ and other officers from intelligence department from prosecution in a connection to mobile and computer hacking by the said government guns, has been passed by […]