Four security researchers at the Columbia University have developed a new technique dubbed Spy in the sandbox attack to spy on victims’ online activity. Four security researchers at the Columbia University (Yossef Oren, Vasileios Kemerlis, Simha Sethumadhavan, and Angelos Keromytis) have developed a new technique to hack computer using a Javascript that allow them to […]
Google is improving its services, last decision it related to the Ads, the company takes a step towards by deployeng “HTTPS Everywhere”. Another good step, coming from google involving encryption. As you may remember Google started to encrypt back in 2008, when Gmail started to use HTTPS. Since 2008, Google has done a remarkable work […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Darwin kernel, just an IP packet to cause the crash of Apple devices How far do stolen data get in the deep web after a breach? NSA dreams of […]
A report published by the Government Accountability Office (GAO) warns that the FAA faces some serious cyber security issues for modern flights. Security experts for a long time suspected that in-flight Wi-fi could create an entry door for hackers and a new report issued by The US Government Accountability Office (GAO) describes the dungeon of […]
WikiLeaks on Thursday published a searchable database of more than 30,000 documents that were obtained by hackers in the cyber attack on Sony Pictures. WikiLeaks organization has leaked online a collection of documents stolen in the Sony Pictures data breach, more than 30,000 files showing the inner workings of a “secretive” firm. WikiLeaks published the […]
Google Launches Chrome 42 that deprecates the NPAPI (Netscape Plugin API) due to the numerous problems it caused in the past. Google has released Chrome 42, a version that implements the important choice to exclude any plugin using the API called NPAPI (Netscape Plugin API) to extend browser functionalities. The Netscape Plugin API is dated back 1990 […]
A recent report published by Dell revealed a 100 percent increase in the number of attacks on industrial control (SCADA) systems. The new Dell Annual Threat Report revealed that the number of attacks against supervisory control and data acquisition (SCADA) systems doubled in 2014 respect the previous year. Unfortunately, the majority of incidents occurred in SCADA systems is […]
The NYDFS released a new report on the Cyber Security in the Banking Sector that highlights problems faced by almost every bank in the US with third party vendors. Last week, The New York State Department of Financial Services (NYDFS) released a report on the Cyber Security in the Banking industry, the analysis revealed several disconcerting […]
Encryption has been used by more people over time and this has led to the NSA and the US Government to suggest new ways of accessing encrypted content. The uprising course of encryption and the fact that its use has become a lot more frequent and continues on increasing in popularity has made the United States wonder how they […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Firefox 37 arrives with Opportunistic Encryption support Google Internet Authority G2 has become untrusted due to an expired certificate Security Affairs newsletter Round 3 – Best of the week […]