The security researcher Patrick Barker discovered that Samsung is disabling Windows Update to run its own bloatware opening users to cyber attacks. The security researcher Patrick Barker discovered that Samsung is disabling Windows Update to run its own bloatware leaving is customers wide open to cyber attack. Barker discovered that Samsung disable Windows update after a […]
Privacy advocates claim snooping component was activated within Chromium, potentially exposing private conversations. Privacy advocates are accusing Google. Privacy advocates and open source developers claim over the secret installing of Google software which is capable of listening in on conversations held in the surrounding environment. It seems that the listening component was involuntarily activated within […]
Adobe has released a security update for the critical Adobe Flash Player vulnerability CVE-2015-3113 that is being actively exploited in the wild. Security experts at FireEye discovered a critical heap buffer overflow vulnerability, coded CVE-2015-3113, that affects Adobe systems. FireEye discovered that the Adobe flaw is being exploited in the wild by the hacking crew […]
What is the Dark Web? Unveiling the myth of the Dark Web and making sure that people understand its magnitude and its limitations. Letâs begin by explaining what the so called âDark Webâ actually is. This is a term used to describe a collection of websites that may be publicly visible, but they hide information […]
The Europol announced the creation of a team that aims to find key figures in propaganda campaigns run by ISIS members seeking to recruit foreign fighters. Isis‘s machine propaganda is a very important target, since it generates something like 100.000 daily tweets, and itâs used to recruit foreign fighters to support the group. Isis is gaining […]
A recent wave of car burglaries raises the debate on possible hacking techniques adopted by car thieves .. Signal amplification and brute-force attacks. A few months ago the journalist Nick Bilton wrote about his car being broken into in front of him. Bilton believes that his car was stolen by using snatched with the help of a signal […]
The Electronic Frontier Foundation published the “Who Has Your Back? 2015” report that ranked WhatsApp ranked as the worst in protecting users’ privacy. The Electronic Frontier Foundation has published its annual report “Who Has Your Back? 2015: Protecting Your Data From Government Requests” that analyzes how private companies handlesusers data with specific focus on Government surveillance. “Which […]
This post is an excerpt from the article titled “Evolution of 3D Printing Technology Raises Security Concerns” available on the Infosec Institute. Also known as the term additive manufacturing (AM), 3D printing is a process for making a three-dimensional object of almost any shape starting from a 3D model or other electronic data source. Through […]
NIST is seeking more advanced tattoo forensic analysis, matching the tattoos into a computer system could help law enforcement to catch more offenders. One in five American adults has at least one tattoo and this number is much higher among the criminal population. Law enforcement has used tattoos as a means of criminals and victim […]
Period 2015 has become a continuous process of turbulent scenarios in cyberspace because new potential threats, by dealing new opportunities for cybercrime. Period 2015 has become a continuous process of turbulent scenarios in cyberspace because new potential threats, by dealing new opportunities for cybercrime with massive Cyber Poisons. Nevertheless, Antidotes are also part of a […]