Government records stolen in the recent data breach at the US OPM (Office of Personnel Management) are surfacing from the Dark Web. While security experts speculate on the possible responsible for the recent data breach at US the Office of Personnel Management (OPM) the alleged data appeared in the dark web. I have personally found it on […]
A German security researcher reported hundreds of wind turbines and solar systems wide open to easy exploits worldwide due to the lack of security by design The German researcher Maxim Rupp has discovered numerous security issues in clean energy systems, including solar lighting and wind turbines. The possible consequence of a cyber attack is the […]
Following the recent OPM data breach the White House requested IT administrators to implement and adopt basic security measures. A few days ago news media agencies reported the data breach at the US Office of Personnel Management (OPM), according to the US Government the hack is one of the largest breaches of federal employeesâ data. Data […]
Appleâs iOS 9 will force users to strengthen the device passcode and improve the two-factor authentication mechanism. Apple is revealing a series of improvement for its new iOS 9, today we have discussed the content blocker announced by Apple, and the company now announced new measures to improve the security of its devices. The iOS9 will substitute the 4-digit […]
Apple announced a series of improvement for it IOS 9, including a content blocker can kill a lot of applications similar the popular AdBlock. A lot have been talks about IOS 9, and now looks like Apple included an ad-blocking feature in its OS, I would say it is a great news for its customers, […]
After 4M records may have been stolen and Chinese hackers are the prime suspects, the US Govrecognizes the usefulness of the DHS EINSTEIN defense system. After 4 million records may have been stolen and Asia-based hackers are the prime suspects, the government recognizes the usefulness of the DHS EINSTEIN defense system. At this time, the […]
TrapX, a renowned security providing delivery of deception based cybersecurity defense uncovered a security flaw in medical field dubbed as medical device hijack, or simply put MEDIJACk. The flaw can allow attackers to exploit main healthcare systems by breaking into the unpatched and outdated medical devices. Let it be Anthem hack or CareFirst BlueCross BlueShield, this year has […]
The US Air Force bombed an ISIS HeadQuarter after tracking location through the analysis of the imaged posted on social media platforms. ISIS members make professional use of social media for propaganda and to recruit new sympathizers, but intelligence agencies are trying to exploit every little mistake to track down the terrorist cells. Air Force […]
During the Infosecurity Europe 2015 security experts talk about a foresight vision about the Critical National Infrastructure industry (CNI). During the Infosecurity Europe 2015 ânumber one Information Security event, celebrated in London on 3rd June 2015, it was a special occasion to talk about a foresight vision about the Critical National Infrastructure industry (CNI). In […]
A security expert explained how it is possible to hack the service provided by a utility company raising serious security and privacy issues. In the most recent post of atxsec.com the owner of the blog talks about a flaw that he discovered after trying to pay his utility bill. To pay his utility bill he decided […]