Users of the popular Agora Dark Market have been targeted by unknown crooks who sent them malicious java script exploit that tries to steal their Bitcoin. Users of the popular Agora Marketplace have been targeted by unknown crooks who sent them malicious messages trough their PM system. The messages contain a malicious java script exploit that […]
German media states that Bundestag may need to replace 20,000 computers after the recent attack, an operation that could cost millions Euro. A few days ago the experts the German Government has confirmed that hackers who breached the Bundestag systems a few of weeks ago have also stolen data from targeted network. A spokeswoman for the Bundestag, […]
Apple announced a series of improvement for it IOS 9, including a content blocker can kill a lot of applications similar the popular AdBlock. A lot have been talks about IOS 9, and now looks like Apple included an ad-blocking feature in its OS, I would say it is a great news for its customers, […]
A security expert discovered that United Airlines accounts could be locked-out by running a brute-force attack. The effects on a large scale could be serious. According to WorldMate security officer Yosi Dahan, a threat actor could easily lock-out United Airlines users from their accounts. Dahan explained that reported the security issue in March under the United Airlines bug bounty […]
A security expert demonstrated how to exploit a vulnerability in Apple IOS system to steal user password with a phishing email. A new vulnerability that affects Apple’s iOS could be exploited by hackers to collect user passwords by using a single email. Jan Soucek (@jansoucek) , a forensic expert at Ernst and Young has developed […]
Belgian law enforcement exploited end-to-end encryption gaps in WhatsApp to intercept messages exchanged between members of a Chechen jihadist group. According to a report published by Bloomberg, two men were arrested and warrants were issued for other three suspects that were allegedly preparing a terrorist attack in Belgium. The interesting part of the news is that law […]
Crooks are using the NFC capability of Android smartphone to steal your credit card data, two researchers presented the PoC at the HITB. Crooks are using the NFC capability of Android smartphone to steal your credit card data, itâs scaring but true. But first letâs introduce the Near field communication (NFC) as “a set of […]
The hackers of the SEA, the Syrian Electronic Army, defaced the US Army website exploiting an Army’s commercial content delivery network provider. After a short period of silence, the group SEA and defaced the official website of the US Army and added a pop-up message displaying the following text: “Your commanders admit they are training the people they […]
TrapX, a renowned security providing delivery of deception based cybersecurity defense uncovered a security flaw in medical field dubbed as medical device hijack, or simply put MEDIJACk. The flaw can allow attackers to exploit main healthcare systems by breaking into the unpatched and outdated medical devices. Let it be Anthem hack or CareFirst BlueCross BlueShield, this year has […]
The owner of the Tox ransomware builder is offering for sale the platform worried by its popularity. He confirmed that he will pay ransoms to his customers. The owner of the famous Tox ransomware has decided that it was time to sell the platform, this after all popularity reached by its platform. The Tox platform […]