Security experts at ERPScan discovered a serious security issue in SAP’s in-memory relational database management system, HANA. The SAP in-memory relational database management system, HANA, is affected by a serious security issue, the static encryption key is stored in the database. The fact that the encryption key is static means that every SAP HANA installation […]
WikiLeaks on Thursday released 276,394 new files from the Sony Pictures hack, the documents demonstrates the influence of the company on US the Gov. WikiLeaks added more 276,394 documents to its search page, these documents were acquired when the alleged group of North Korean hackers GOP hacked the Sony network. The first documents were published […]
Trustwave firm published a report related to 2014 incidents that revealed cyber criminal activities are paying with 1,425% return on investment. Hackers are seeing a whopping 1,425% return on investment for these two kinds of attacks Security experts at Trustwave published an interesting report on the return on investment related to illegal activities online. The experts revealed that […]
A team of researchers from Indiana University discovered a number of XARA vulnerabilities in both Apple’s OS X and iOS that allows Apple Keychain crack. A team of researchers from Indiana University (Luyi Xing, Xialong Bai, XiaoFeng Wang, and Kai Chen lead by Tongxin Li, of Peking University, and Xiaojing Liao, of Georgia Institute of […]
Security expert at Voidsec have analyzed the popular social networking minds.com disclosing a number of security vulnerabilities. Security expert at Voidsec, Paolo Stagno ( aka voidsec – [email protected] ) and Luca Poletti ( aka kalup – [email protected] ), have analyzed the popular social networking platform minds.com that is getting attention by media because it aims to give transparency and protection to user […]
Anonymous claimed responsibility for running DDoS attacks on Canadian government systems against the approval of anti-terror law C-51. An ongoing cyber attack is targeting systems of the Canadian Government, including Government websites and email systems. The cyber attack started a few days after members of the Canadian parliament were warned of an impending attack. The […]
Security researchers at the GData security firm discovered a second stage of the cyber attack on the German Bundestag that exploited a banking trojan to steal data. In the last weeks, I have reported the various news related to the cyber attack against the Bundestag and a possible involvement of Russian state-sponsored hackers. The media reported that […]
More than 600 million Samsung S devices could be opened to cyber attacks because a flaw in the validation of language pack updates for the SwiftKey keyboard. More than 600 million Samsung smartphones could be opened to cyber attack due to the presence of a security flaw in the validation of the  Swiftkey language pack updates. The […]
Security experts at Nettitude reported that VoIP (Voice over IP) infrastructures worldwide are targeted by a growing number of cyber attacks. A new wave of attacks against Voice over IP (VoIP) systems is targeting UK businesses, security experts believe that a surge was advantaged by the greater availability of hacking tools in the criminal underground. […]
The cloud-based application, LastPass has been compromised but encrypted user vault data doesn’t look to have been accessed by hackers. The popular cloud-based password management service LasPass has been compromised, exposing user account email addresses, password reminders, server per use salts, and authenication hashes. It seems that encrypted user vault data haven’t been accessed. “We […]