Delft Dynamics conducted a successful test, where a drone was taken out of the air by another unmanned aerial vehicle named DroneCatcher. The drone industry is growing at a rapid pace. Aerospace research company Teal Group has estimated that sales of military and civilian drones will total over $89 billion in the next 10 years. […]
US and UK are planning to simulate a cyber attacks on nuclear plants, to test their resilience in the light of the nuclear security summit. In the light of the recent events with the terrorist attacks in Europe, the fear of other similar threats becomes greater by the minute. Coordinates cyber attacks on nuclear plants would […]
Experts at CloudFlare revealed that 94 percent of the Tor traffic they see is âper se malicious,â but Tor Project opposes it. The experts from the Content delivery network (CDN) CloudFlare revealed that 94 percent of the Tor traffic they ordinary see is âmalicious.â It is not a mystery that Tor is becoming a favored tool of cyber […]
For the first time in a decade, the US National Institute of Standards and Technology (NIST) has updated its secure email guide. The last effort of the NIST Agency in the development of email security guidelines is dated 2007 when it published the  NIST SP 800-45, Version 2 – Guidelines on Electronic Mail Security. The […]
SideStepper is a method to install malicious apps on iOS devices by abusing the mobile device management (MDM) solutions. Security researchers from the Check Point firm have devised a method to install a malicious code on iOS devices by abusing the mobile device management (MDM) solutions used by many enterprises. The technique relies on a vulnerability dubbed by […]
Apple failed in fixing the System Integrity Protection security mechanism and the exploits code released by a researcher fits in a Tweet . Last week security media reported a critical privilege escalation flaw (CVE-2016-1757) in the Apple System Integrity Protection (SIP) security mechanism, a vulnerability that was present at the time of the discovery in all the version […]
Paris terrorists used burner phones and US lawmakers have proposed a bill that would force retailers to record the identity of the buyers of these devices. Law enforcement and intelligence agencies worldwide are fighting against terrorist organizations operating in their territories, but investigations are hampered by the use of encrypted communications. After the Paris attacks, intelligence agencies […]
Google is improving its Gmail warning service to help protect the customers from state-sponsored hacking and surveillance activities. Google confirmed that one million Gmail accounts might have been targeted by nation-state hackers. The news is worrying, the company is observing a significant increase in the number of hacking attacks on user email accounts. Google announced […]
Terrorists behind Bruxelles attacks were spying on an eminent nuclear researcher planning a nuclear plant attack and the building of a dirty bomb. The news is disconcerting, the two brothers behind the Brussels attacks, Khalid and Ibrahim El Bakraoui, were also spying on an eminent researcher and were planning to build “dirty bomb.” The Belgium’s Federal […]
Google has issued a new security update for its Chrome 49 that patches a number of flaws, most of them discovered by external researchers. Google has updated Chrome 49 for all the available versions in order to patch several critical vulnerabilities, including the flaw discovered thanks its bounty program that were rewarded with dozen thousands of […]