The Syrian Electronic Army (SEA) have compromised Skype ‘s Twitter account and blog to protest against the support provided to NSA surveillance programme. Syrian Electronic Army has conducted first hack of 2014 hitting Skype, the group of hackers want to remind us that nothing is secure and that netizens will never accept the monitoring of […]
Leaked documents shared by Der Spiegel show how NSA spyware codenamed DROPOUTJEEP can spy on every Apple iPhone. Apple denies any claim. Users buy the iPhone, NSA controls them. This is not a slogan for the last Apple advertising, it is the uncomfortable truth revealed by another set of NSA documents leaked by Snowden and […]
CDM (CYBER DEFENSE MAGAZINE) PRESENTS: CYBER WARNINGS DECEMBER 2013 EDITION The December edition of the free Cyber Defense Magazine is out. Don’t miss it.  SPONSORED BY RSA CONFERENCE 2014 Read each FLIPBOOK edition electronically, online and flip through the page: CYBER WARNINGS E-MAGAZINE: DECEMBER 2013 CYBER DEFENSE MAGAZINE: ANNUAL EDITION FOR 2013 Download a color PDF […]
The Russian hacker known as “HASH” and “Rev0lver” took control of a BBC server and attempted to sell access to it to other cybercriminals. A hacker compromised a server at the BBC (British Broadcasting Corporation) and started a Christmas Day campaign to sell the access to the machine to other cyber criminals. The evidences of […]
Der Spiegel revealed that the TAO unit of NSA planted backdoors to access computers, hard drives, routers, and other devices from principal vendors. Germanyâs Der Spiegel has published another disturbing article on the NSA surveillance activities, the media agency has published an internal NSA catalog that offers spies backdoors into a wide range of equipment from […]
EBay website is vulnerable to XSRF (Cross-site request forgery) attack that would allow an attacker to hijack an account and make unauthorized purchases. A new flaw has been discovered in the official EBay website, the vulnerability allows an attacker to hijack an account and make unauthorized purchases from the victimâs account. The flaw is not […]
An Israeli security researcher from the Ben-Gurion University of the Negevâs Cyber Security Labs has discovered a serious security flaw in Samsung Knox. Samsung Knox is affected by a serious flaw, the discovery was made by an Israeli security researcher, Mordechai Guri, from the Ben-Gurion University of the Negevâs Cyber Security Labs. Samsung Knox is […]
Microsoft Security Intelligence Report states the malware encounter rate in Turkey is far greater than that of any other country in the entire world. The Microsoft Security Intelligence Report (SIR) is a periodic study of the threat landscape of exploits, vulnerabilities, and malware. It is based on data from Internet services and over 600 million […]
RSA published a blog post to deny the accusation about secret partnership with the National Security Agency and the use of flawed algorithm in its product. A couple of days ago on Internet was spread the news that Security firm RSA has signed a $10 million contract with the National Security Agency (NSA) to maintain […]
CloudPassage organized an exercise to demonstrated how it is simple the live server exploitation of cloud environments poorly configured. Cloud computing is considerable one of the paradigms with highest penetration level with mobile and social networking, for this reason we discussed many times on security level offere by those infrastructures that are even more targets […]