1195 results
Compare and contrast WhatsApp and Telegram, so as to see which of the two messaging apps offers the best option for encrypted chat. Messaging apps have been increasing rapidly in popularity. WhatsApp has gone over one billion users and Telegram claims to have over 350,000 people a day signing up for its services. So, it […]
Two security experts have conducted a study that allowed them to spot over 100 snooping Tor HSDir Nodes spying on Dark Web Sites. The attempts of snooping traffic from Tor nodes are not a novelty, in the past, we have reported the activity of threat actors that set up malicious exit nodes to de-anonymize users. Early 2014, […]
According to The Intercept, FBI has at its disposal “hundreds of millions of dollars” for developing technology to use in its investigations. The FBI has at its disposal “hundreds of millions of dollars” for developing technology to use in both national security and domestic law enforcement investigations, including surveillance. But, the FBI won’t release that […]
Adobe Flash Player 22.0.0.192 release fixes the Flash Player zero-day vulnerability (CVE-2016-4171) exploited by the APT group dubbed ScarCruft. Adobe has issued the Flash Player 22.0.0.192, a release that fixes the Flash Player zero-day vulnerability (CVE-2016-4171) exploited by the APT group dubbed ScarCruft in attacks on high-profile targets. The Flash Player flaw CVE-2016-4171 affects versions 21.0.0.242 and earlier for […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all let inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html How to bypass two-factor authentication with a text message WauchulaGhost targets ISIS Twitter Accounts and floods them with […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all let inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html THANK YOU! Old CVE-2014-3704 flaw in Drupal still exploited in attacks Sh0ping.su hacked, stolen card data and accounts […]
Global Intelligence Insight, working with SecurityAffairs and SecurityMediaPublishing deliver a weekly report on issues in Syria and Iraq as well as extremist related global terrorism. GLOBAL INTELLIGENCE INSIGHT Global Intelligence Insight, working with SecurityAffairs and SecurityMediaPublishing will deliver a weekly report on issues in Syria and Iraq as well as extremist related global terrorism. Data […]
The potential of IoT devices connected over cloud networks is breathtaking, opening opportunities that will forever change societal culture. It’s a buzzword that has been around the past decade and has often been portrayed in futuristic visions of a society where man and technology has integrated into one. The potential of IoT devices connected over cloud […]
The popular Tor developer Jacob Appelbaum left the Core Team of the Tor Project after “sexual mistreatment” allegations. Appelbaum is recognized as one of the most active and influential digital advocates and security researchers. He is one of the few reporters to have had a preview of the NSA secret documents leaked by Edward Snowden. The news is […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Hacking NTP Servers from Long-Distance with low cost devices Why surveillance firm Blue Coat was granted a powerful encryption certificate? Security Affairs newsletter Round 62 – News of the week Highly targeted ransomware campaign hit Swedish Telia […]