Today we will speak with Anonrising freesec, a hacker that is very active online and that is also fighting online terrorism. You are a talented hacker that has already participated in several hacking campaigns, could you tell me more about you. Sure, I’ve been working with OPDdosISIS mainly against ISIS, taking sites down (2013-2015) also Im […]
Kaspersky Lab presented an investigation on the future of ATM Biometric Skimmers and how cybercriminals could exploit them. A recent investigation by Kaspersky Labs reports that a number of underground sellers are offering skimmers, which have the capability of stealing users biometric data such as fingerprints. A number of others are researching iris scanning and […]
Experts from Elcomsoft discovered a new vector of attack to access password-protected local backups produced by iOS 10 devices. According to security experts from the computer forensics company Elcomsoft, Apple has weakened the backup security protection of its recently-issued iOS 10 skipping certain security checks. This means that hackers could easily crack password protection used […]
The popular hacker Luca Todesco (aka @qwertyoruiopz) has announced the existence of the iPhone 7 jailbreak for devices running iOS 10. Only a few hours, this is the time spent by the popular hacker Luca Todesco (aka @qwertyoruiopz) to jailbreak the new and secure iPhone 7. The iPhone 7 was launched by Apple a few days ago and of […]
Today I’ll present the hacker Toxic Venom, a member of P.G.A hacking group that is one of the most active teams in this period You are a popular hacker that has already participated in several hacking campaigns, could you tell me more. I began hacking 5 years ago. I was drawn by the Anonymous collective as […]
The announcement about the Yahoo data breach is online, the company confirmed that hackers managed to access data from at least 500 million user accounts. Today I wrote about the imminent announce of the Yahoo data breach related to an incident that resulted in the leakage of 200 million Yahoo account credentials this summer. The company has finally […]
Following an investigation by Pen Test Partners, British Telecom (BT) has released a firmware upgrade for their popular range of Wi-Fi extenders. The investigation uncovered vulnerabilities within the firmware when left the device exposed to possible XSS (Cross Site Scripting) Exploits as well as the ability to change the user’s password without notification. By combining […]
It’s a question of hours, security experts believe Yahoo will confirm the massive data breach that exposed at least 200 Million Yahoo accounts. Yahoo is ready to confirm a massive data breach that affected its service that has exposed several hundred million user accounts. “Yahoo is poised to confirm a massive data breach of its […]
The Shadowserver Foundation has conducted a scan of the Internet for CISCO devices running IOS software affected by the CVE-2016-6415 vulnerability. Recently experts from CISCO discovered a vulnerability, tracked as CVE-2016-6415, in IOS system,while investigating the Equation Group‘s exploits leaked by the Shadow Broker hacker group. In particular, experts from CISCO were evaluating the impact […]
Security firm Certego has been detecting multiple viral spam campaigns leveraging a new malware evasion technique it called BadEpilogue. Starting from May 2016, Certego Threat Intelligence platform has been detecting multiple viral spam campaigns using a new evasion technique. These attacks are able to hide malicious attachments inside a specific area of the MIME/Multipart structure and […]