1036 results
The Europol coordinated the Operation Daylight against criminals that were sharing child sex images on the internet, 75 suspects have been arrested. It’s summertime, but there is no vacation for the agents of the Europol that arrested 75 suspects in 28 European countries for sharing child sex images on the internet. The European law enforcement […]
Security researchers discovered a new Linux Trojan dubbed Linux.Rex.1 that is capable of self-spreading and create a peer-to-peer botnet. A newly observed Linux Trojan is capable of self-spreading through infected websites and can recruit the infected machines into a peer-to-peer (P2P) botnet, Doctor Web researchers warn. Security researchers from the firm Dr. Web have discovered […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all let me inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html THANK YOU! Hitler ransomware just deletes files instead encrypt them Security Affairs newsletter Round 73 – News […]
A group of hackers claims to have hacked the NSA Equation Group, it is selling hacking tools and exploits in online auction. Security experts discussed several times about potential effects of the militarization of the cyberspace. Government-built malware and cyber weapons may run out of control, cyber weapons and hacking tools developed by nation-state hackers […]
Dear Readers, today I want to present you Dêfãult Vírüsa one of the most intriguing hackers on the Internet. He is the Admin of #AnonSec & @L0sExtraditable hacker groups Enjoy the Interview. You are a talented hacker that has already participated in several hacking campaigns, could you tell me more about. Our page on EncyclopediaDramatica should […]
Two researchers have devised a cryptocurrency scheme dubbed DDoSCoin that pays everytime a user participates in a DDoS attack against certain servers. The assistant professor at the University of Colorado Eric Wustrow and the phD student at the University of Michigan Benjamin VanderSloot have conducted a curious proof-of-concept project aimed at the creation of a cryptocurrency that […]
The bug hunting company Exodus announced its bug bounty program. Who will pay more for a 0-day exploit? Reflecting on the zero-day market. Almost every IT giant has launched its bug bounty program, the last in order of time is Apple that last week announced the initiative during the Black Hat Conference. How much is […]
A team researchers at Arizona State University (ASU) is crawling the Darkweb searching for zero-days for Proactive Cybersecurity Threat Intelligence Can finding zero-day vulnerabilities be as easy as crawling the Darkweb? Security researchers at Arizona State University (ASU) think so and they’re already seeing some success. In a paper titled, “Darknet and Deepnet Mining for […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all let inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html THANK YOU! Danger Drone, the flying hacking machine devised by a cyber security duo A close look at […]
Experts from Dr Web discovered a new PoS malware dubbed Kasidet that can bypass User Account Control (UAC) by posing as a legitimate Microsoft application. A new strain of PoS malware is in the wild, experts from security firm Doctor Web named it Trojan.Kasidet.1 and it is able to bypass defense mechanism such as the Microsoft […]