A team of security researchers announced to have developed Astoria, a new Tor client designed to beat the NSA and reduce the efficiency of timing attacks. Tor and Deep web are becoming terms even popular among Internet users, the use of anonymizing network is constantly increasing for this reason intelligence agencies are focusing their efforts in its monitoring. […]
Security experts at AppRiver firm have discovered a malicious campaign that is distributing a strain of ransomware via SVG files. Researchers at the AppRiver security firm have uncovered a malicious campaign that is distributing a strain of ransomware by exploiting SVG files. The SVG (Scalable Vector Graphics) is an XML-based vector image format for two-dimensional graphics […]
Law enforcement warns thieves are using the mini-helicopters and commercial drones to carry out reconnaissance on homes to burgle. Security and privacy issued related to the use of drones must be carefully addressed in order to avoid dangerous effects due to their diffusion, there are several ways to abuse of such complex and powerful machines […]
The crash of the Airbus A400M military transport in Spain was caused by a software bug, three engines were shut down immediately after the start due to the flaw. Recently we have discussed a lot about the possibility to hack a plane, almost everyone has read about the computer security researcher Chris Roberts which reported the […]
DDoS attacks even more dangerous according to the last report published by Akamai Technologies, the “Q1 2015 State of the Internet – Security Report”. According to Akamai Technologies, Q1 2015 showed that distributed denial-of-service attacks are on the rise again, and according to Akamai Technologies, Q1 set a record for the number of DDoS attacks, […]
A new report published by Arbor Networks and the Ponemon Institute explains how Financial Service and Retail Organizations tackle advanced threats. Regardless of the recent string of high-profile cyberattacks plaguing companies worldwide, the retail industry is still behind on cybersecurity standards, according to new reports published by Arbor Networks and the Ponemon Institute. Researchers disclosed it takes […]
Intel Security published an a curious study to test consumer knowledge about phishing practice and measure the ability to detect phishing emails. For this study, Intel Security presented 10 emails where people were asked to identify which emails were phishing with the purpose of steal personal data, and which were legit, legal emails. The data for the […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Hiring hackers, how much is it? US SOCOM and The Special Forces to Scrutinize Social media Skynet, the US top-secret program to track terrorists PHP hash comparison flaw is […]
The computer security researcher Chris Roberts reported the FBI that he obtained the control of at least one commercial flight causing it to âclimbâ. A new search warrant filed in a federal court in New York state published Friday by the Canadian website APTN revealed that the aviation computer security researcher Chris Roberts reported the FBI that […]
The Debian-based distribution Tails 1.4 (The Amnesiac Incognito Live System) is available online and it is improved to preserve user privacy and anonymity. The Debian-based distribution Tails, âThe Amnesiac Incognito Live System,âversion 1.4Â is available online! Tails is a popular live operating system (that means that users can start it on almost any computer from removable […]