A URL Spoofing flaw affects the Apple Safari browser. It could trick users into visiting malicious websites despite they are accessing to legitimate URLs. A serious security vulnerability affects the Apple Safari browser, the flaw could be exploited by attackers to trick Safari users into visiting malicious websites while are trying to surf on legitimate websites. […]
The penetration tester Thiebauld Weksteen has published an interesting analysis to explaine the importance of robots.txt for the hacking activities. Thiebauld Weksteen, a penetration tester from Melbourne is advising system administrators that robots.txt can give precious details to hackers, when it comes to attacks, because robots.txt as the capability to tell search engines which directories […]
Intel Security published an a curious study to test consumer knowledge about phishing practice and measure the ability to detect phishing emails. For this study, Intel Security presented 10 emails where people were asked to identify which emails were phishing with the purpose of steal personal data, and which were legit, legal emails. The data for the […]
The UK Government is giving GCHQ, Intelligence services and law enforcement full hacking powers. People are scared by a law that gives GCHQ the immunity. New legislation exempting police, GCHQ and other officers from intelligence department from prosecution in a connection to mobile and computer hacking by the said government guns, has been passed by […]
The Anonymous collective continues the wave of cyber attacks against the Expo 2015 Universal Exposition, the last victim in order of time is the Best Union. Anonymous Italy continues to target the Expo 2015 Universal Exposition being hosted in Milan with a series of attacks under the Operation Italy (#OpItaly). The collective of hackers it targeting […]
A team of researchers explains that million of lives potentially depends on the resilience to cyber attacks of a new generation of “artificial pancreas.” Medical devices are open to cyber attacks, many studies have demonstrated that a large number of medical systems could be affected by security flaws that could be exploited by hackers. A […]
Russian hackers have developed a Sony PS4 crack which is used by Brazil retailers to break console security and sell pirated games to their customers. A group of Russian crackers has discovered a method to hack the popular Sony PS4 and bypass its security measures. The group is offering it hack on the Brazilian market, […]
The computer security researcher Chris Roberts reported the FBI that he obtained the control of at least one commercial flight causing it to “climb”. A new search warrant filed in a federal court in New York state published Friday by the Canadian website APTN revealed that the aviation computer security researcher Chris Roberts reported the FBI that […]
Security researchers at Security Explorations firm have published PoCs code for some of security issues in the Google App Engine. The Polish firm Security Explorations has published online the technical details and a proof-of-concept code for security flaws affecting the Google App Engine (GAE) for Java. “Security Explorations decided to release technical details as well as […]
Oil and gas industry targeted by hackers with a genuine looking windows file, not a malware. The attacks are ongoing for about two years. A unique targeted attack being underway for about two consecutive years exploits Windows file functions that look legitimate and a couple of homemade scripts – but not malware – in order […]