search

Date range
Filters

1196 results

Pierluigi Paganini September 01, 2015
Dozens dating websites got breached by Russian hackers

A huge number of individuals are in danger because of massive attacks by Russian hackers, total 97 websites have been broken and most of them are dating sites. Security experts at Hold Security discovered that a significant amount of websites, including dating portals like the Ashley Madison, has been targeted by massive attacks managed by Russian hackers. The […]

Pierluigi Paganini September 01, 2015
Agora Black Market fearing Tor vulnerabilities goes down

Agora black marketplace announced Tuesday evening that it will go temporary offline fearing the exploitation of the Tor flaws recently discovered. Operators of principal black markets are concerned about the real level of anonymity offered by the Tor network after the discovery of critical vulnerabilities affecting the anonymizing system. The administrators of the Agora black market, one […]

Pierluigi Paganini August 30, 2015
Point-of-Sale Payment Security

In this post the author Scott Thompson explores the basics of Point-of-Sale Security analyzing threats and possible solutions. Basics of Point-of-Sale Security In late 2013, at the height of the holiday shopping season, Target Corporation’s point-of-sale payment network was breached, and over 70 million customers had their card payment information stolen, including this author, creating […]

Pierluigi Paganini August 28, 2015
Symantec discovered 49 New Modules of the Regin espionage platform

Symantec revealed the existence of 49 new modules of the Regin espionage platform, a circumstance that suggests that its operators are still active. In November 2014, security experts at Symantec have uncovered the backdoor Regin, a highly advanced spying tool used in cyber espionage campaigns against governments and infrastructure operators.  The Regin malware has been around […]

Pierluigi Paganini August 25, 2015
The relentless ascent of DDoS attacks

The report Q2 2015 State of the Internet published by Akamai states that there has been a multiplying growth in the quantity of DDoS assaults year over year There has been a multiplying growth in the quantity of DDoS assaults year over year, as per Akamai. Keeping in mind assailants’ planer preferred less capable yet […]

Pierluigi Paganini August 19, 2015
AT&T secretly helped Spy agency, suggests new NSA leaked documents

The US National Security Agency has utilized an exceptional, decades-old association with AT&T to snoop on Internet utilization, as per recently uncovered reports spilled by Edward Snowden. The archives gave by the previous NSA foreman and checked on by The New York Times and ProPublica portrayed a “profoundly synergistic” telecom titan that showed a “great […]

Pierluigi Paganini August 10, 2015
IT giants join forces to combat child sexual abuse imagery

Facebook, Google, Twitter, Microsoft and Yahoo and the Internet Watch Foundation (IWF) are joining their efforts in the fight against child sexual abuse. Facebook, Google, Twitter, Microsoft and Yahoo are joining their effort in the fight against child sexual abuse. The IT giants child after joining forces with a the UK charity, the Internet Watch Foundation […]

Pierluigi Paganini August 05, 2015
TaiG Jailbreak for Mac, tool for jailbreaking iOS 8.4 (Mac OS X version) Released

Apple’s iOS 8.4 operating system for Mac OS X can be jail broken now, thanks to the Untethered Jailbreak tool released by the Chinese jailbreaking team TaiG Apple’s iOS 8.4 operating system for Mac OS X can be jail broken now, thanks to the Untethered Jailbreak tool released by the Chinese jailbreaking team TaiG. Quite […]

Pierluigi Paganini August 05, 2015
Terracotta VPN, the Chinese VPN Service as Hacking Platform

A Chinese-language Virtual Private Network service provider dubbed Terracotta VPN offers a network of compromised servers as a stealth hacking platform. According RSA Security, a China-based virtual private network (VPN) service provider offers hacking crews a network of compromised servers which can be used to carry out stealth cyber attacks. The attacks appear to be […]

Pierluigi Paganini August 01, 2015
MIT researchers identify Tor hidden services with 88 percent accuracy

Researchers have successfully carried out a traffic correlation attack against the Tor Network identifying hidden services with 88 percent accuracy. Researchers from the Massachusetts Institute of Technology (MIT) have discovered a vulnerability in Tor which lead the identification of hidden services with up to 88 percent accuracy. The team of experts composed of researchers from […]