Microsoft declared war to Ad injection and âman-in-the-middleâ techniques implemented by both malware and legitimate programs including adware. Superfish adware was found already installed on new Lenovo portable PCs (laptops) earlier this year. The malware opens users to MITM (man in the middle) assaults in view of the way it infuses ads into web browsers. […]
The security expert Ariel Sanchez presented the results of the test conducted on 40 iOS banking apps, comparing them to the ones obtained 2 years ago. The banking industry is looking with an increasing interest in mobile platform, financial institutes are offering a growing number of services accessible through mobile devices, but what about security? The security […]
Step by step the HTML5 language is replacing the flawed Flash that hackers have exploited in an impressive number of cyber attacks in the wild. It may help the fact that Facebook is leaving Flash behind and it is adopting HTML5 (YouTube has done in the a recent past). “We recently switched to HTML5 from […]
At tonightâs Democratic national debate Hillary Clinton Hillary Clinton calls tech companies to work on a new Manhattan Project for Encryption. At tonightâs Democratic national debate Hillary Clinton calls tech companies cooperate to create âa Manhattan-like project.â The US Government is expressing its concerns about the possible misuses of encryption that today represents a serious obstacle […]
Basically all Dutch citizens who own a mobile phone are at risk of attack due to poor security practices at the Phone House. The  freelance IT security consultant Sijmen Ruwhof discovered that personal info of more than 12 million Dutch mobile phone are open to cyber attacks. Ruwhof  detailed all the security issues he noticed in a […]
The popular expert and Shodan creator John Matherly found over 650 terabytes of MongoDB data exposed on the Internet by vulnerable databases. Last week my old hosting provider GoDaddy created me a lot of problems so I had no opportunity to write about this interesting story, now I passed to a better provider and I […]
Microsoft fixed a vulnerability in Microsoft Outlook that could allow remote code execution if the victim opens a specially crafted Office doc. Microsoft recently fixed a number of critical bugs with the last “Patch Tuesday” issued on December 8, including an update to the Microsoft Office suite to fix a number of security issues. One of the […]
A group of computer scientists at the Massachusetts Institute of Technology has developed the most secure SMS text messaging system. A group of computer scientists at the Massachusetts Institute of Technology (MIT) has developed a new SMS text messaging system, dubbed Vuvuzela, that is untraceable and could allow truly anonymous communications. The researchers explained that their SMS text […]
A New Zealander expert has found hundred of thousands of vulnerable engine immobilizers are remotely hackable due to a flaw. The New Zealander Lachlan Temple (@skooooch) has discovered hundred of thousands of vulnerable engine immobilizers are remotely hackable. The expert discovered a flaw in a popular cheap car tracking and immobilizer gadget that can allow remote attackers […]
The End-to-end encrypted database ZeroDB becomes open source and its code is available on GitHub, try it and contribute to the community with your experience. While politicians and experts are debating around encryption, the End-to-end encrypted database ZeroDB becomes open source and its code is available on GitHub. ZeroDB is an end-to-end encrypted database in […]