A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Google To Speed Up The Internet With Its New QUIC Protocol APT28 Russian hackers exploited two zero-day flaws in the wild Security Affairs newsletter Round 5 â Best of […]
The European Rail Traffic Management System is a signalling system that will control all the Britain’s trains and it could potentially be hacked. By increasing the penetration level of the technology in our ordinary life, we are increasing our surface of attack. We have discussed many times about the risks for critical infrastructure, but threat […]
Which is the impact of the Windows XP End of Life on the critical infrastructure? Recently a Government audit found 48,000 XP PCs still running at TEPCO. One year ago the end of life for Microsoft Windows XP raised a heated debate on security for all the infrastructure that still adopt the popular OS. Windows XP […]
Sucuri revealed that cyber criminals are attempting to hijack online shops based on Magento platform by exploiting a recently disclosed critical flaw. According to the security experts at Sucuri firm, within 24 hours after the disclosure of the vulnerability in Magento platform, bad actors are already attempting to hack e-commerce websites using it. The experts traced back the attacks […]
Four security researchers at the Columbia University have developed a new technique dubbed Spy in the sandbox attack to spy on victims’ online activity. Four security researchers at the Columbia University (Yossef Oren, Vasileios Kemerlis, Simha Sethumadhavan, and Angelos Keromytis) have developed a new technique to hack computer using a Javascript that allow them to […]
Google is improving its services, last decision it related to the Ads, the company takes a step towards by deployeng âHTTPS Everywhereâ. Another good step, coming from google involving encryption. As you may remember Google started to encrypt back in 2008, when Gmail started to use HTTPS. Since 2008, Google has done a remarkable work […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Darwin kernel, just an IP packet to cause the crash of Apple devices How far do stolen data get in the deep web after a breach? NSA dreams of […]
A report published by the Government Accountability Office (GAO) warns that the FAA faces some serious cyber security issues for modern flights. Security experts for a long time suspected that in-flight Wi-fi could create an entry door for hackers and a new report issued by The US Government Accountability Office (GAO) describes the dungeon of […]
WikiLeaks on Thursday published a searchable database of more than 30,000 documents that were obtained by hackers in the cyber attack on Sony Pictures. WikiLeaks organization has leaked online a collection of documents stolen in the  Sony Pictures data breach, more than 30,000 files showing the inner workings of a “secretive” firm. WikiLeaks  published the […]
Google Launches Chrome 42 that deprecates the NPAPI (Netscape Plugin API)  due to the numerous problems it caused in the past. Google has released Chrome 42, a version that implements the important choice to exclude any plugin using the API called NPAPI (Netscape Plugin API) to extend browser functionalities. The Netscape Plugin API is dated back 1990 […]