Experts at Kaspersky firm provided evidences that the hackers behind cyber espionage campaign NetTraveler are still active and improved their attack methods. Last June Kaspersky firm uncovered a new global cyber espionage campaign dubbed NetTraveler. Kasperskyâs team discovered that NetTraveler targeted over 350 high profile victims from 40 countries. The name of the operation derives from […]
The researchers led by Aaron Johnson of the Naval Research Laboratory published the paper on TrafïŹc Correlation Attacks against Anonymity on Tor. Anonymity on Tor network is the primary reason for the use of the popular network, hacktivists, whistleblowers, hackers, and cybercriminals are enticed by the possibility to be not traceable. Straying far from prying eyes is the primary attraction for the user of  Tor project. In reality […]
The article proposes the analysis of the impact on the use of the Tor network after the events related to PRISM surveillance program disclosure. The use of Tor Network to preserve user’s anonymity and to avoid government surveillance, we discussed this topic several times explaining that through the analysis of Tor metrics data it was possible to […]
Former LulzSec leader Sabu (Hector Xavier Monsegur) accused by the hacker Jeremy Hammond to have incited state-sponsored attack for the U.S. Government. LulzSec was a popular group of hacktivists that breached many high profile targets during the last years, we all remember the Sony Pictures occurred in 2011. The group also claimed responsibility for taking down many other […]
Security expert Dancho Danchev profiled one of the numerous hacking services offered in the underground highlighting new trends in the cybercrime ecosystem. With the term attack-as-a-service model is indicated the practice to outsource all the phases of an attack to specialists instead to rent tools and architecture to conduct personally the illegal activities (Malware-as-a-Service). Danchev […]
A study titled âIran:How a Third Tier Cyber Power Can Still Threaten the United States” states that Iran has sufficient cyber capabilities to attack the US Iran has sufficient cyber capabilities to attack the US causing serious damages to the critical infrastructures of the country. The news doesnât surprise the cybersecurity experts that know very […]
Microsoft Security Advisory reveals a vulnerability in Windows Phone OS that could allow information disclosure Microsoft has issued a security advisory related to a vulnerability in Windows Phone OS that could allow information disclosure, the flaw is related to Wireless PEAP-MS-CHAPv2 Authentication used by Windows Phone to access to wireless network. According the Microsoft Security Advisory (2876146) a hacker exploiting […]
Snowden revealed that NSA designed a system called XKeyscore considered the “widest-reaching” architecture for developing intelligence from the internet. XKeyscore, NSA former technicians Edward Snowden revealed that the agency has another secret program to spy on user’s Internet experience tracking practically every his activity … PRISM isn’t an isolated surveillance program. The NSA tool collects ‘nearly […]
At least three White House employees personal Gmail accounts hacked by the popular group of hackers knows as Syrian Electronic Army (SEA). White House employees personal email hacked, it is happened to three staffers that suffered data breaches on their personal Gmail accounts. The source of intelligence revealed a link between this attack and the […]
Spy agencies reportedly have a long-standing ban on Lenovo PCs due to backdoor vulnerabilities that could allow an attacker to remotely access to the computers. Spy agencies reportedly have a long-standing ban on Lenovo PCs due to backdoor vulnerabilities. Lenovo PC banned by spy agencies in the UK, Australia and the US due the possible impairment […]