Google is a mine of information that could be used for various purposes, for this reason National Security Agency realized a book to help its spies uncover intelligence hiding on the web. Few days ago I published an interested article inspired by security expert Dancho Danchev and focused on the use of Google Dorks based tool […]
A new version of DIY Google Dorks based hacking tool has been released, it is an extremely useful tool for reconnaissance of targets. A Webroot blog post announced that a new version of DIY Google Dorks based hacking tool has been released in the wild and it could be used for mass website analysis, the […]
Security experts have discovered a new IE8 zero-day vulnerability exploited to target U.S. Government experts working on nuclear weapons research. Security experts have discovered a new IE8 zero-day vulnerability exploited to target U.S. Government experts working on nuclear weapons research, the concerning discovery has been confirmed by principal security firms that revealed that the flaw […]
Bloomberg published a report on QinetiQ data breach, the company has been compromised from 2007 to 2012 by Chinese hackers. The UK-based defense contractor QinetiQ is vulnerable to cyber attacks, the news is sensational and has created a lot of noise on the Internet, due the critical role of the company as primary providers for U.S. […]
The McAfee security firm found an Adobe Reader vulnerability that reveals where a PDF document is opened. The McAfee security firm found an Adobe Reader vulnerability that reveals where a PDF document is opened, once again Adobe products are the center of attention of security experts after the numerous attacks that have exploited flaws in its products for cyber espionage campaigns. […]
LivingSocial data breach exposed 50 million customer records, the news is shocking and is circulating on the Internet since last Friday. On The internet is circulating the news of the LivingSocial data breach, an incident that menace the privacy of million of users and that rekindling the debate on the level of security provided by major service companies […]
Yahoo! Blind SQL Injection could allow attackers can inject own SQL commands A Yahoo! Blind SQL Injection has been discovered by an Egyptian information security advisor … What could be the problems arising? Data leakages are the nightmares of every administration of databases, a growing number of services are exposed on the Internet with related data, Billion of customers’ record […]
Recently hackers have intensified the number of attacks against corporate social media accounts, the Twitter account is most targeted ones due the high interest of businesses in this comfortable communication channel. Various the companies that have recently been hacked on Twitter including 60 Minutes, 48 Hours and a Denver news affiliate, The New York Times, […]
We all remember the debated attacks of Anonymous collective against Israeli government that targeted various websites of the country last April 7th. The data on the cyber attacks reported by Israel government are really different from the one provided by the group of hacktivists in the damage report for #OpIsrael that account for a Total […]
The news is sensational, to take control of a plane is not necessary a group of terrorists, a hacker with limited resource could take control on the entire control system, including plane navigation and cockpit systems according the researcher Hugo Teso. Teso is a security consultant at N.runs AG, Germany, with a passion for flying in […]