Any owner of WordPress site is shaking causes of the threat that someone could steal its credentials, everybody would do well to ask themselves if their passwords are really strong and to make sure to don’t use as username the word “admin.” The reports published by CloudFlare and HostGator revealed a massive attack being launched against WordPress blogs […]
One of the most interesting company in security landscape is ReVuln, its researchers specialize in the security assessment and are the authors or various interesting studies on large scale applications and SCADA systems, few weeks ago I presented their work on vulnerability assessment on Gaming platforms. This time I desire to present another excellent analysis […]
The #OpIsrael is destined to make the history, for the first time a collective decided to conduct a large-scale cyber attack against a state, despite the campaign started a few months ago it has reached its peak on 7th April when various organizations of hacktivists targeted Israele Web sites with powerful DDoS attacks and in some cases defacing them […]
In various articles I wrote on the large diffusion of botnets and the capabilities of malicious agents to use as spread channel the social media platforms or popular applications. The diffusion and management of a botnet architecture has never been so easy, the underground offer covers every need and provides advanced customization services. Security expert […]
The day is near, the group of hackers belonging to the collective of Anonymous declared in a unanimous way, war on the state of Israel, promising a sensational action on April 7th. The popular group of hacktivists started in the last months a campaign dubbed #OpIsrael to protest against Israeli bombing of Palestinian territory, the hackers have […]
It’s not a surprise South Korean security experts suggest that the North Korea military is training an elite force of “cyber warriors” to involve in cyber attacks against South institutions and companies. The South intelligence revelations follow continuous menaces of North Korea against U.S. Forces located in the Far East, the dictator Kim Jong-UN enhances […]
Researchers at Hacktive Security, an independent security consulting company, have demonstrated how much insidious could be a so a simple and crimeless large scale application. We are in the digital era, everything is connected to the large networks and applications benefit of even more complex devices that deeply interact with the owner, in this scenario […]
Israel is considered by various group of hacktivists an enemy state to fight, for this reason they decide a joint operation to start on April 7th as part of #OpIsrael. The attack started in 2012 against the protest against Israeli bombing of Palestinian territory, hacktivists are expressing full solidarity with the Palestinian people, the interest is high […]
Many times we discussed about large diffusion of mobile devices and of related cyber threats, around a months ago I presented the case of HTC mobile that revealed 18 million devices commercialized by Taiwanese company had security flaws that could exposes users to serious risks, in particular the bugs could allow the theft of information […]
Sky is a brand names for satellite television providers and channels, owned or partially owned by News Corporation an American diversified multinational mass media corporation headquartered in New York City, United States. The IT specialist, Fabio Natalucci, published a blog post related a vulnerability on the Italian web site that allows an attacker to perform a brute force attack […]