Microsoft encourages Windows users to remove the Windows Journal application by following the steps found in Microsoft update KB3161102. Microsoft has removed the Windows Journal application from its OSs due to the presence of multiple security flaws that can be exploited by hackers through specially crafted Journal files (.jnt) which are used to store notes […]
The Cyberkov Security Incident Response team spotted a cyber espionage campaign in Lybia conducted by a group named Libyan Scorpions. Thinking of Libya we have in mind a non-stable political country where various forces fight for the control of strategic territories and oil productions. but only a few experts know about cyber malicious activities in the area. Evidently, something […]
According to the popular cyber security experts an unknown nation state actor may be running tests for taking down the entire internet infrastructure. What happens if someone shuts down the Internet? Is it possible? Our society heavily depends on technology and the Internet is the privileged vector of the information today. Blocking the Internet could […]
The Police in the Australian State of Victoria issued a warning to the local population of malware-laden USB drives left in letterboxes. USB drives are a privileged vector of attack, security experts have demonstrated that it is possible to hide malicious code in memory stick that could compromise almost every computer. We are aware that […]
The hacker Ardit Ferizi, aka Th3Dir3ctorY, who helped ISIS to share a Kill List of US Military Personnel has been sentenced to 20 years in a US prison Months ago, I reported you the story of Ardit Ferizi, aka Th3Dir3ctorY, who is the hacker that supported the ISIS organization by handing over data for 1,351 US […]
Today we will speak with Anonrising freesec, a hacker that is very active online and that is also fighting online terrorism. You are a talented hacker that has already participated in several hacking campaigns, could you tell me more about you. Sure, I’ve been working with OPDdosISIS mainly against ISIS, taking sites down (2013-2015) also Im […]
Kaspersky Lab presented an investigation on the future of ATM Biometric Skimmers and how cybercriminals could exploit them. A recent investigation by Kaspersky Labs reports that a number of underground sellers are offering skimmers, which have the capability of stealing users biometric data such as fingerprints. A number of others are researching iris scanning and […]
Experts from Elcomsoft discovered a new vector of attack to access password-protected local backups produced by iOS 10 devices. According to security experts from the computer forensics company Elcomsoft, Apple has weakened the backup security protection of its recently-issued iOS 10 skipping certain security checks. This means that hackers could easily crack password protection used […]
The popular hacker Luca Todesco (aka @qwertyoruiopz) has announced the existence of the iPhone 7 jailbreak for devices running iOS 10. Only a few hours, this is the time spent by the popular hacker Luca Todesco (aka @qwertyoruiopz) to jailbreak the new and secure iPhone 7. The iPhone 7 was launched by Apple a few days ago and of […]
Today I’ll present the hacker Toxic Venom, a member of P.G.A hacking group that is one of the most active teams in this period You are a popular hacker that has already participated in several hacking campaigns, could you tell me more. I began hacking 5 years ago. I was drawn by the Anonymous collective as […]