Security firm RIPS Technologies has analyzed 44,705 in the official WordPress plugins directory and discovered that more than 8,800 of them are flawed. Experts from the security company RIPS Technologies have conducted an interesting analysis of WordPress plugins. The researchers have analyzed 44,705 of the roughly 48,000 plugins available in the official WordPress plugins. “To do […]
Experts from the Tor project have launched an early alpha version of Sandboxed Tor Browser 0.0.2. to protect users’ anonymity. Experts from the Tor project have launched an early alpha version of Sandboxed Tor Browser 0.0.2. The Sandboxed Tor Browser aims to isolate the Tor Browser from other processes of the operating system in order to limit its ability […]
Motherboard published an interesting blog post which includes further details on the cost of StingRay phone surveillance equipment. A couple of years ago I published a post on Stingray Technology trying to explain how governments track cellular devices. A StingRay is an IMSI-catcher (International Mobile Subscriber Identity) designed and commercialized by the Harris Corporation. At the time of the […]
The UK Government published the first annual report on the implementation of the 2015 National Security Strategy. The strategy considers cyber security a top priority alongside the resurgence of state-based threats (Russia’s actions in Syria and Ukraine) and the terrorism (extremism and instability). When dealing with the impact of technology, especially cyber threats the report […]
Experts at the Nuclear Industry Summit (NIT) explained how to reduce the risk of damaging cyberattacks at nuclear facilities. The threat of cyber attacks on nuclear power plants and other nuclear facilities is substantial and on the increase, according to experts at the Nuclear Industry Summit, held earlier in the year. Hackers are becoming more […]
Alleged Asian hackers have targeted the German heavy industry giant ThyssenKrupp to steal company secrets. Hackers from Southeast Asia targeted the German heavy industry giant ThyssenKrupp in the attempt of obtaining “technological know-how and research results.” The news was announced on Thursday by a company spokesman that confirmed a report in the Wirschaftswoche weekly and added that the company […]
The last update for the Uber app raises great concerns because it asks to track users’ location even when they’ve been dropped off and exited the program. The last update of the Uber App allows it to track the passengers’ locations even when they have been dropped off and the application is running in the […]
The US Commission on Enhancing National Cybersecurity, tasked by President Barack Obama, issued its final report with recommendations on cybersecurity. Cyber security is a primary issue in the agenda of many countries, the U.S. Presidential commission has recently issued recommendations to urge a proactive cooperation between private and public sectors. The collaboration aims to improve the security […]
Experts from the security firm CheckPoint discovered a new Android malware dubbed Gooligan that has already compromised more than a million Google Accounts. Another malware, dubbed Gooligan, is threatening Android users. The Android malware has already compromised more than 1 Million Google accounts. The Gooligan Android malware roots vulnerable Android devices in the attempt of stealing email addresses and authentication […]
According to a Dutch television program data on several investigations into the terrorism groups conducted by the Europol were accidentally leaked. According to Dutch television program Zembla, data on several investigations into the terrorism groups conducted by the Europol were accidentally leaked online. According to the program, the dossier contained information about 54 different police investigations, including […]