In recent years the perception of the role of hackers is completely changed, in the past these high-skilled professionals were viewed as dangerous threats that needed to be kept at armâs length, meanwhile today they are highly sought from private companies and intelligence agencies. “An increasingly large number of modern business operations rely on an understanding of the […]
Law enforcement identifies and located suspects members of a criminal organization that used gas pump skimmers, by using the GPS technology. The number of attacks against ATMs located in supermarkets and Gas pumps is constantly increasing, the crooks use credit and debit card skimmers that use different technologies to steal card data and steal them. Today […]
Hackers have a new tool in their arsenal dubbed Facebook Friends Mapper that allows them to crawl Facebook Hidden Friends list just in a click. Facebook users can protect their privacy by setting the “privacy level” for every information related their profile or content they post online. Users can decide to completely set as private the information in […]
More than four million smart meters and similar devices worldwide are open to cyber attacks due to the security issued in the Open Smart Grid Protocol. The Open Smart Grid Protocol (OSGP) is a family of specifications published by the European Telecommunications Standards Institute (ETSI) that are implemented today by more than four million smart […]
A new collection of documents leaked by Snowden revealed how the US intelligence converts spoken conversation in indexable text with RHINEHART and VoiceRT tools. Following the disclosure of Top-secret documents provided by Edward Snowden everyone is aware of the risks of using any sort of communications methods, what was once private now it isnât anymore, […]
Certain versions of common drug infusion pumps are affected by numerous remotely exploitable vulnerabilities that could not open the doors to hackers. We discussed several times about the opportunity to hack medical devices and the needs of security by design for these objects. In 2012 the US Government Accountability Office (GAO) published a report that highlighted the necessity to secure […]
Hackers belonging to the Anonymous collective hacked the website of the World Trade Organization (WTO) and leaked personal data of thousands of officials. Hackers belonging the Anonymous collective compromised the website of the World Trade Organization (WTO) and leaked its database containing personal data of its members. The stolen data are related to personnel of […]
An Australian teenager who hacked Microsoft, Valve and the US Army has left the Australia. The Interpol is searching for him in Europe. An Australian teenager, who had allegedly hacked into Microsoft and the US Army websites left Australia to escape the capture. The Australian authorities have informed the Interpol, which is involved in the research […]
A few hours after the presentation of the Google Password Alert extension a researcher already have developed two methods to bypass it. A few hours ago, Google released the Password Alert extension that was designed to warn users when they are submitting their Google credentials to fraudulent websites. âHereâs how it works for consumer accounts. Once youâve […]
Foreign hackers are targeting background investigation databases to blackmail US government personnel or to try to bribe them. It is not a mystery that Chinese hackers continuously target US companies and government offices, the attackers usually backed by the Government of Bejing mainly run cyber espionage campaigns to steal intellectual property and any kind of information related to person […]