Researcher with the pseudonym of "Alister Maclin" claims to be able to break Bitcoin network on demand by running the malleability attack. According to MotherBoard, a researcher with the pseudonym of ...
The Cleaver group is once again in the headlines managing a well-developed network of fake LinkedIn profiles for cyber espionage purpose. Do you remember the Iran-based APT Cleaver? In December the s ...
Microsoft web applications, such as Outlook or OneDrive and account pages, expose visitors’ Microsoft Identifier (CID) in plain text. A Chinese developer, which uses the pseudonym of ramen-hero, di ...
A group of researchers from the iTrust has demonstrated how to use a Drone to intercept wireless printer transmissions from outside an office building. Recently I wrote a blog post on the Infosec ...