Cyber attacks can crash trains. Intense security concerns have emerged, after the upgrade of the British railway network that can be affected by malware. The new railway network upgrade in the United Kingdom has raised a lot of concerns, as far as its overall network security is concerned. It seems that over thirty million pounds […]
A security researcher conducted an experiment to demonstrate that someone is sniffing passing traffic from Tor network exit nodes. When talking about Tor network, normally everyone assumes that you have an end-to-end security, but someone believes it may be wrong as it was discovered by the security researcher Chloe. Tor network is free and it […]
Following the clamorous Hacking Team hack the company asked all its customers to shut down all the operations and don’t use its solutions in this phase. Hacking Team has been hacked and its social media account hijacked, the news is shocking the IT security industry because privacy advocated have always accused the company to sell […]
A number of AirLive Cameras are affected by command injection vulnerabilities that could allow attackers to decode user credentials and control the devices. A number of IP-enabled AirLive cameras manufactured by OvisLink Corp are affected by command injection vulnerabilities that could be exploited by attackers to decode user credentials and completely control the devices. According […]
Hacking Team, the Italian surveillance firm that develops spyware and hacking software has been hacked by attackers that exfiltrated some 400Gbs of data. The Italian security firm Hacking Team has allegedly been hacked, unknown attackers have exfiltrated some 400Gbs of data. The company has often been at the center of heated debate because of surveillance […]
The former Secretary of Defense William Cohen revealed that the US power grid is vulnerable to terror attacks, a major cyber attack was a matter time. Security experts and US politicians are aware that the power grid is vulnerable to a terrorist attack. Nation’s power grid is a privileged target for terrorists as explained by the former […]
 IPv4 Exhaustion: The North America ran out of IPv4 addresses and according to the ARIN it has officially exhausted its supply of IPv4 addresses. The news of the day is that North America ran out of IPv4 addresses and according to The American Registry for Internet Numbers (ARIN) it has officially exhausted its supply of IPv4 […]
Wikileaks reveals an extended economic espionage activity conducted by the NSA in Germany, the spies were particularly interested in the Greek debt crisis. Recently we spoke about the last collection of data disclosed by Wikileaks on NSA massive surveillance, highlighting the cyber espionage operations of the US intelligence against principal security firms and the France politicians, today we […]
Founder of the ahmia.fi project reported that someone is cloning and booby trapping hundreds of Dark Web sites and is re-writing some of the content. The “ahmia.fi” project census Dark Web websites, aka hidden services, by providing search engine functionalities by indexing the content present on the Tor network. Nurmi noticed an anomalous number of clones of hundreds […]
Researchers discovered a vulnerability in the 802.11n wireless networking standard that could be exploited by a remote attacker to target wireless networks. According to researchers from the Expertise Centre for Digital Media at the Hasselt University in Belgium, the frame aggregation mechanism implemented by the 802.11n wireless networking standard is affected by a security a […]