While a video of a drone firing a semi-automatic handgun is circulating on the internet, security experts demand a strict law in the use of UAVs. I decided to present you this case to raise once again, my concerns on the uncontrolled and the unregulated diffusion of drones. Unmanned aerial vehicles (UAVs) are a powerful instrument […]
Anonymous affiliate GhostSec has supported US law enforcement and Intelligence agencies in thwarting Isis terror plots in New York and Tunisia. The popular Anonymous affiliate GhostSec has provided useful information on preventing terrorist attacks on New York and Tunisia planned by the Islamic State (Isis), according to a counterterrorism expert. According to the Internation Business Times, Michael Smith, an adviser to […]
Fiat Chrysler has recalled 1.4 million vehicles following security researchers hacked a Jeep Cherokee remotely by exploiting a vulnerability in its systems. One of the arguments most debated in the hacking and security community this week is the recent hack of a Fiat Chrysler Jeep. The security experts Chris Valasek and Charlie Miller have demonstrated […]
A study conducted by HP’s Fortify on security features implemented by Smartwatches revealed that not even a single device found to be 100 percent safe. Today we talk about a great passion of mine, watches. Let me tell you that I’m not attracted by Smartwatches, I consider watches and their gears a work of art […]
Anonymous hackers announced to have compromised the US Census Bureau against TTIP/TPP and leaked data online as proof of the data breach. Anonymous hackers announced to have compromised the US Census Bureau against TTIP/TPP. The members of the popular collective are the same that hacked World Trade Center (WTC) according to the colleagues at the Hackread.com. The […]
Kaspersky’s researchers warned LinkedIn about a security flaw that could put at risk their 360 million users and exposing them to spear phishing attacks. In November 2014, Kaspersky’s researchers warned LinkedIn about a security flaw that could put at risk their 360 million users. This was a big concern at the time because LinkedIn has […]
The HP Zero Day Initiative has disclosed four new zero-day vulnerabilities in Internet Explorer that can be exploited by attackers to remotely execute code. The HP’s Zero Day Initiative has disclosed four new zero-day vulnerabilities in Internet Explorer that can be exploited by attackers to remotely execute code. The four zero-day flaws affect different components of the browser […]
Netragard has shut down its exploit acquisition program, as a result of the clamorous data breach that the Italian firm HackingTeam has suffered. In this article we will go through an issue with a company that buys and sells exploits (Netragard) and the steps it was forced to take since one of their clients was […]
A new critical vulnerability was discovered in the widely used OpenSSH software, hackers exploiting this flaw can run brute-force attacks against servers. A new critical vulnerability was discovered in the widely used OpenSSH software, hackers exploiting this flaw can run brute-force attacks against server performing thousands of authentication requests remotely. The vulnerability affects the latest version […]
Researchers have discovered a critical local privilege escalation (LPE) vulnerability in the Mac OS X operating system, but Apple will fix only by October. German researcher Stefan Esser, founder of security audit company SektionEins, has discovered a local privilege escalation (LPE) vulnerability in the Mac OS X operating system that affects OS X 10.10.x. Esser decided to […]