At the fifth annual European Security Blogger Awards at Infosecurity Europe in London SecurityAffairs was awarded as Best European Personal Security Blog Yesterday, during the fifth annual European Security Blogger Awards at Infosecurity Europe in London SecurityAffairs received the awardĀ as Best European Personal Security Blog. The awards were assigned through a public voteĀ and votes assigned […]
A hacker is offering for sale more than 32 million Twitter account credentials with plans to sell the account details on the Dark Web. Recent news of massive data breaches suffered by IT giants LinkedIn, MySpace, Tumblr, and VK.comĀ shockedĀ the security industry. Millions of login credentials are available for sale in the principal black markets, […]
A security expert discovered that a crafted PDF document that includes an embedded JPG2000 image can trigger a buffer overflow in the Chrome PDF reader. The security expert Aleksandar Nikolic from the Cisco Talos group has discovered an arbitrary code execution vulnerabilityĀ (CVE-2016-1681)Ā in PDFium, which is the PDF reader component installed by default in Google Chrome […]
China is ready to launch its first hack proof quantum communication satellite, are we entering a new era of telecommunications. SatellitesĀ have a crucial role in our digital society, almost every industry is benefiting from their services for this reason their security is a pillar of the cyber security strategy of governments worldwide. Attackers are posing […]
New research conducted by Citrix indicates that some businesses are stockpiling Bitcoins so they can pay cybercriminals fast in case of ransomware attacks. New research conducted by Citrix, a corporate networking company, indicates that some businesses are stockpiling Bitcoins so they can pay cybercriminals fast, if their data is held ransom by malicious software. Ransomware […]
The μTorrent team announced its community μTorrent forum has been hacked. Hundreds of thousand records belonging its users have been exposed. Are you a Torrent user? Are you one of the users of the popular μTorrent Forum? You might be in troubleĀ because the μTorrent Forum was hacked. μTorrent is one of the most popular BitTorrent clients, […]
Security experts discovered a security vulnerability in the Facebook Messenger App that allows hackers to replace the content of the messages they send. Security experts from Check Point early this week reported a serious vulnerability in the Facebook Messanger App that could be exploited by attackers to replace the content of the messages they send […]
Security experts from FireEye have observed attacks leveraging on Angler EK to deliver exploits capable of evading the Microsoft EMET security Tool. Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) is a free security tool designed by Microsoft to implement a supplemental security layer of defense against the exploitation of vulnerabilities affecting applications running on Windows Systems. […]
Hackers discovered it is possible to remotely control features of Mitsubishi Outlander PHEV by hacking the mobile applications designed by the car vendor. A team of experts from the UK security firmĀ Pen Test Partners has demonstrated that it is possible to remotely control some feature of the popular SUV Mitsubishi Outlander plug-in hybrid electric vehicle […]
Experts from Kaspersky Lab have conducted an experiment to demonstrate the risks for charging mobile devices with untrusted USB charging points and PCs. A simple operation like charging mobile Smartphone could expose users at serious risks. It is not a novelty, mobile devices could be hacked while owners are charging them by using a standard […]