The US Air Force bombed an ISIS HeadQuarter after tracking location through the analysis of the imaged posted on social media platforms. ISIS members make professional use of social media for propaganda and to recruit new sympathizers, but intelligence agencies are trying to exploit every little mistake to track down the terrorist cells. Air Force […]
During the Infosecurity Europe 2015 security experts talk about a foresight vision about the Critical National Infrastructure industry (CNI). During the Infosecurity Europe 2015 ânumber one Information Security event, celebrated in London on 3rd June 2015, it was a special occasion to talk about a foresight vision about the Critical National Infrastructure industry (CNI). In […]
A security expert explained how it is possible to hack the service provided by a utility company raising serious security and privacy issues. In the most recent post of atxsec.com the owner of the blog talks about a flaw that he discovered after trying to pay his utility bill. To pay his utility bill he decided […]
Security experts at ClearSky have published a report on the a cyber espionage campaign dubbed Thamar Reservoir that is targeting entities in the Middle East. Security experts at ClearSky have uncovered a cyber espionage campaign dubbed Thamar Reservoir due to the name of its target Thamar E. Gindin. The investigation led the experts to date the Thamar Reservoir […]
Several US schools are using social media monitoring platform to watch students and their online activities in order to prevent risky situations. A number of US schools are using social media monitoring software to watch students and their online activities. According to the news website Click Orlando, the institutes have bought access to sophisticated social media monitoring […]
Security experts Ben Cox explained that the official Github repositories of the UK Government, Spotify, and Python were accessed using compromised SSH keys. Ben Cox, engineer at CloudFlare revealed that the official Github repositories of the UK Government, Spotify, and Python were accessed by using legitimate SSH keys. It seems that the keys were compromised […]
Facebook users can add PGP keys to their profiles in order to receive “end-to-end” encrypted notification emails sent from Facebook. On June 1, 2015, Facebook announced a new security feature to enhance the privacy of notification email content. Now, Facebook users are able to add PGP keys to their profiles in order to receive “end-to-end” […]
US financial industry is under persistent attacks, the number of incidents that compromised confidentiality, integrity and availability of data are increasing. Financial industry in US maintains symptoms of persistent cyber-attacks among surprising cyber incidents and large-scale data breaches that compromised confidentiality, integrity and availability of userâs information. Several advanced hacking methods and the exploitation of zero-day flaws […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. The Phantom Menace, who targeted the oil tankers? Hi-tech car thieves use ÂŁ30 jamming devices in car parks Researcher who exploits bug in Starbucks gift cards gets rebuke, not […]
An overview of the principal issues related to the 3 general categories that security controls fall under; physical, technical, and operational controls. What is Layer 8? Layer 8 is a term utilized by information security professionals and techies in general that represents the weakest link of every organization: the users. While an organization may be […]