Edward Snowden revealed to the German public broadcaster ARD TV that the NSA is involved in industrial espionage against foreign governments and businesses. The former NSA contractor Edward Snowden revealed that the National Security Agency is responsible of industrial espionage, for year governments are blaming China for cyber espionage and now the popular whistleblower presented an uncomfortable truth to […]
A serious vulnerability inside Mozilla Thunderbird Gecko engine allows hackers to insert malicious code into Emails to exploit recipient browser. A critical vulnerability affects the email client Mozilla Thunderbird 17.0.6, the popular application has a validation and filter bypass vulnerability that could be exploited by hackers to bypass the filter that prevents HTML tags from being used in […]
The Federal Bureau of Investigation (FBI) seized the database of Tormail service for its investigation on cybercrime and illegal online hacking. Do you have used the Tormail Email service to protect your privacy? Are you searching for anonymity online? Well, the revelation regarding Tor Stinks project and many recent news on the spying activity discovered on Tor Traffic made […]
Michaels Stores Inc., US-based arts-and-crafts retailer, confirmed it is investigating a possible data breach affecting customer cards. Michaels Stores Inc., US-based arts-and-crafts retailer maybe is the last victim of a massive data breach, a few weeks after the hack of US retailer Target and Neiman Marcus. Michaels Stores Inc has more than 1,250 stores across the United […]
100 lines of code could hack new Snapchat people verification feature that displays nine images and requests new user to select the one containing a ghost. Snapchat is considered by many security experts a case study on how a lack of security by design could hit a large community of users impacting their privacy, a few […]
Web developers Tal Ater discovered a Google Chrome Bug that allows websites to listen to user private conversations. Google still hasn’t patched it! Google Chrome is one of the most diffused browsers, it has an excellent reputation in terms of security, usability and performance but it is wrong to consider it as perfect. As any […]
Researchers Winter and Lindskog identified 25 nodes of Tor network that tampered with web traffic, decrypted the traffic, or censored websites. Two researchers, Philipp Winter and Stefan Lindskog of Karlstad University in Sweden, presented the results of a four-month study conducted to test Tor network exit nodes for sneaky behavior, it has been discovered that a not specified Russian […]
SplashData has issued its Annual “25 Worst Passwords of the Year” enumerating the list of the most common password chosen by users. It was October 2012 when for the first time I’ve seen a report from SpashData on most common passwords chosen by users to protect their account on various services. SplashData, which develops password […]
Solutionary security firm published SERT Q4 2013 Threat Intelligence Report to provide an overview of the overall threat landscape. Recently Solutionary security firm published SERT Q4 2013 Threat Intelligence Report to provide an overview of the overall threat landscape, the document is the result of a research conducted over the last three months correlating events across devices […]
Financial Supervisory Service confirmed that Stolen credit card data of at least 20 million bank and credit card users in South Korea has been leaked. While US are facing with a series of clamorous data breached against principal retailers, in South Korea an employee of personal credit ratings firm Korea Credit Bureau (KCB) has been […]