Security

Hackers’ capability to crash trains raises security concerns, malware could lead to train crashes in the UKHackers’ capability to crash trains raises security concerns, malware could lead to train crashes in the UK

Hackers’ capability to crash trains raises security concerns, malware could lead to train crashes in the UK

Cyber attacks can crash trains. Intense security concerns have emerged, after the upgrade of the British railway network that can…

10 years ago
Traffic in Tor network is being sniffed in the exit nodesTraffic in Tor network is being sniffed in the exit nodes

Traffic in Tor network is being sniffed in the exit nodes

A security researcher conducted an experiment to demonstrate that someone is sniffing passing traffic from Tor network exit nodes. When…

10 years ago
Hacking Team asks customers to stop operations and don’t use its malwareHacking Team asks customers to stop operations and don’t use its malware

Hacking Team asks customers to stop operations and don’t use its malware

Following the clamorous Hacking Team hack the company asked all its customers to shut down all the operations and don't…

10 years ago
A number of vulnerabilities affect IP Enabled AirLive CamerasA number of vulnerabilities affect IP Enabled AirLive Cameras

A number of vulnerabilities affect IP Enabled AirLive Cameras

A number of AirLive Cameras are affected by command injection vulnerabilities that could allow attackers to decode user credentials and…

10 years ago
Surveillance firm Hacking Team hacked [Updated]Surveillance firm Hacking Team hacked [Updated]

Surveillance firm Hacking Team hacked [Updated]

Hacking Team, the Italian surveillance firm that develops spyware and hacking software has been hacked by attackers that exfiltrated some…

10 years ago
US power grid vulnerable to cyber attacksUS power grid vulnerable to cyber attacks

US power grid vulnerable to cyber attacks

The former Secretary of Defense William Cohen revealed that the US power grid is vulnerable to terror attacks, a major…

10 years ago
Is the IPv4 Exhaustion a real problem?Is the IPv4 Exhaustion a real problem?

Is the IPv4 Exhaustion a real problem?

 IPv4 Exhaustion: The North America ran out of IPv4 addresses and according to the ARIN it has officially exhausted its…

10 years ago
Wikileaks: NSA spying on top German officials for economic reasonsWikileaks: NSA spying on top German officials for economic reasons

Wikileaks: NSA spying on top German officials for economic reasons

Wikileaks reveals an extended economic espionage activity conducted by the NSA in Germany, the spies were particularly interested in the…

10 years ago
Unknowns are cloning and booby trapping hundreds of Dark Web sitesUnknowns are cloning and booby trapping hundreds of Dark Web sites

Unknowns are cloning and booby trapping hundreds of Dark Web sites

Founder of the ahmia.fi project reported that someone is cloning and booby trapping hundreds of Dark Web sites and is…

10 years ago
Flaw in 802.11n opens wireless networks to remote attacksFlaw in 802.11n opens wireless networks to remote attacks

Flaw in 802.11n opens wireless networks to remote attacks

Researchers discovered a vulnerability in the 802.11n wireless networking standard that could be exploited by a remote attacker to target…

10 years ago