The U.S. NSA is collecting phone records of millions of Verizon Communications customers, according to a secret court order obtained by the Guardian. The U.S. NSA is collecting phone records of millions of customers Verizon, the second telephone company in the country. The shocking news has been revealed by ‘Guardian‘ whose journalists had access to a “Top […]
Mactans charger, this is the name of the malicious charger that will be presented by researchers at the Black Hat 2013 conference in July that is able to inoculate a malware in any Apple iOS devices. Researchers from the Georgia Institute of Technology announced the creation of Mactans charger, a custom wall charger for Apple iPhone and iPad […]
According to a recent research of Group-IB on cybercrime senior management is considered among most privileged targets. Group-IB is one of the leading companies in fraud prevention, cybercrime and high-tech crime investigations, it is IMPACT-ITU member and one of most active firms in the analysis if cyber criminal phenomena. The firm reported that cyber criminals use personal and confidential data of […]
iCloud could not properly protect the user’s data despite the implementation of a two-factor protection. Millions of users access to the iCloud to store their data such as photos, music and documents and Apple has tried recently to improve their security introducing in March a two factor authentication system … Do users really know the security mechanisms that […]
Drupal data breach – The Drupal Association with an official notice revealed that Drupal was hit by a large-scale data breach that could have exposed data for nearly 1 million accounts. A Drupal data breach was announced by the official Drupal Association, Drupal hit by a large-scale data violation that could have exposed data for nearly […]
The Hacked PayPal Users Reports System has been hacked by popular researcher Nir Goldshlager exploiting a flaw in a third-party application. Hacked PayPal Users Reports System has been hacked by Nir Goldshlager, CEO at BreakSec, I desire to express my admiration for Nir that is giving various lessons to hacking community and to security teams of […]
Adoption of a two-factor authentication process is necessary to increase the robustness for authentication processes, but security is a process that must be cured at 360 degrees. Twitter finally deployed two-factor authentication to improve security of a user’s account, this is the response of popular social network to the various incidents occurred to some of […]
The author Tim Shorrock revealed that the US spy system ThinThread was tested on the unsuspecting population of New Zealand from 2000 to 2001 ThinThread is the name of a project that the National Security Agency conducted during the 1990s, the program was focused on sophisticated techniques for wiretapping and intelligence analysis. The program was discontinued after […]
New cyber attacks from Iran hit US enterprises focusing on energy sector, the offensive has been revealed by American officials and private security experts. A new series of cyber attacks from Iran hit US enterprises, the offensive has been revealed by American officials and private security experts. The attacks are classified as “potentially destructive” and targeted IT […]
German researchers revealed that Microsoft is able to intercept Skype conversation for security reason. Which are risks to the users’ privacy? Microsoft intercept Skype conversations, the topic is at the center of a heated discussion. Before Microsoft acquisition the popular VOIP application was considered very secure and wiretap-proof, it was officially recognized that was impossible […]