The France TV5Monde was almost destroyed by the Russian APT28 groupThe France TV5Monde was almost destroyed by the Russian APT28 group

The France TV5Monde was almost destroyed by the Russian APT28 group

9 years ago

The TV5Monde director-general has told the BBC that his TV was almost destroyed by a targeted cyber attack conducted by…

MITRE will award $50,000 for a solution that detects rogue IoT DevicesMITRE will award $50,000 for a solution that detects rogue IoT Devices

MITRE will award $50,000 for a solution that detects rogue IoT Devices

9 years ago

MITRE has challenged the security community to devise new methods that could help in detecting rogue IoT devices on a…

Shocking, a German nuclear plant suffered a disruptive cyber attackShocking, a German nuclear plant suffered a disruptive cyber attack

Shocking, a German nuclear plant suffered a disruptive cyber attack

9 years ago

A German nuclear plant suffered a disruptive cyber attack, the news was publicly confirmed by the IAEA Director Yukiya Amano.…

Apple Watches banned from UK cabinet meetings to prevent eavesdroppingApple Watches banned from UK cabinet meetings to prevent eavesdropping

Apple Watches banned from UK cabinet meetings to prevent eavesdropping

9 years ago

The UK Government has decided to ban Apple Watches ban from the Cabinet over foreign eavesdropper fears, in 2013 occurred…

Reverse engineering a Smarter Coffee machine for fun and a security lessonReverse engineering a Smarter Coffee machine for fun and a security lesson

Reverse engineering a Smarter Coffee machine for fun and a security lesson

9 years ago

Simone Margaritelli has done a reverse engineering of the Smarter Coffee IoT Machine Protocol to control the machine from his…

Breaking the Microsoft JEA technology to hack a systemBreaking the Microsoft JEA technology to hack a system

Breaking the Microsoft JEA technology to hack a system

9 years ago

The security researcher Matt Weeks discovered a way to abuse the Microsoft Just Enough Administration (JEA) technology to escalate user…

The fall of the Encryptor RaaS also thanks to ShodanThe fall of the Encryptor RaaS also thanks to Shodan

The fall of the Encryptor RaaS also thanks to Shodan

9 years ago

Law enforcement and security experts have dismantled the Encryptor RaaS architecture by localizing one of its servers with Shodan. Shodan…

Also Spotify in the list of services victim of a malvertising campaignAlso Spotify in the list of services victim of a malvertising campaign

Also Spotify in the list of services victim of a malvertising campaign

9 years ago

The users of the free version of the popular Spotify online music service have been served malicious advertisements. Spotify users…

Security Affairs newsletter Round 81 – News of the weekSecurity Affairs newsletter Round 81 – News of the week

Security Affairs newsletter Round 81 – News of the week

9 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

Authorities warn of cyber threat related to malicious ‘Hurricane Matthew’ emailsAuthorities warn of cyber threat related to malicious ‘Hurricane Matthew’ emails

Authorities warn of cyber threat related to malicious ‘Hurricane Matthew’ emails

9 years ago

As the Hurricane Matthew batters the South Carolina coast, authorities are warning of a series of cyber attacks against residents.…