The NSA wants to exploit IoT devices for surveillance and sabotageThe NSA wants to exploit IoT devices for surveillance and sabotage

The NSA wants to exploit IoT devices for surveillance and sabotage

9 years ago

The NSA and other intelligence agencies are spending a significant effort in research for hacking IoT devices for both surveillance…

WauchulaGhost targets ISIS Twitter Accounts and floods them with porn imagesWauchulaGhost targets ISIS Twitter Accounts and floods them with porn images

WauchulaGhost targets ISIS Twitter Accounts and floods them with porn images

9 years ago

WauchulaGhost Hacker groups linked to Anonymous hijack ISIS supporters' Twitter accounts and flood their profiles with PORN picture and irreverent…

Security Affairs newsletter Round 64 – News of the weekSecurity Affairs newsletter Round 64 – News of the week

Security Affairs newsletter Round 64 – News of the week

9 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

How to bypass two-factor authentication with a text messageHow to bypass two-factor authentication with a text message

How to bypass two-factor authentication with a text message

9 years ago

Is Two-factor authentication the solution for any kind of hacks? A text message could be used to take over your…

How to recover files encrypted by all Teslacrypt Ransomware variantsHow to recover files encrypted by all Teslacrypt Ransomware variants

How to recover files encrypted by all Teslacrypt Ransomware variants

9 years ago

Experts from Cisco Talos team have improved their decryptor tool to allow the recovery of files encrypted by all the…

Bolek Banking Trojan, a Carberp Successor is spreading in the wildBolek Banking Trojan, a Carberp Successor is spreading in the wild

Bolek Banking Trojan, a Carberp Successor is spreading in the wild

9 years ago

The Bolek banking Trojan is one of the successors of the notorious Carberp Trojan that targets both 32-bit and 64-bit…

More Fallout from the LinkedIn Breach in new Targeted Attacks on BankingMore Fallout from the LinkedIn Breach in new Targeted Attacks on Banking

More Fallout from the LinkedIn Breach in new Targeted Attacks on Banking

9 years ago

CERT-Bund released a warning that corporate executives may be being targeted with malicious emails using data from the LinkedIn data…

Twitter resets account login credentials for exposed accountsTwitter resets account login credentials for exposed accounts

Twitter resets account login credentials for exposed accounts

9 years ago

Twitter investigated account login credentials recently offered for sale on the dark web, locked the accounts and reset their passwords.…

Necurs Botnet, one of the world’s largest malicious architecture has vanishedNecurs Botnet, one of the world’s largest malicious architecture has vanished

Necurs Botnet, one of the world’s largest malicious architecture has vanished

9 years ago

The Necurs Botnet, one of the world's largest malicious architecture, used to spread the dreaded threats appears to have vanished…

European Union Websites plagued by SQL Injection FlawsEuropean Union Websites plagued by SQL Injection Flaws

European Union Websites plagued by SQL Injection Flaws

9 years ago

Experts have discovered several SQL injection vulnerabilities in the European Union Websites, the European Parliament and the European Commission sites…