A study published by Google demonstrates that manual phishing attacks are the simplest and most effective method for hacking email accounts. A study recently published by Google demonstrates that so-called manual phishing attacks are the simplest and most effective method for hijacking users’ email address. Let’s consider that the manual phishing attacks, as suggested by the name, doesn’t use […]
Aussie spooks have warned of âreal and persistentâ cyberattacks on participants of the upcoming G20 conference in Brisbane. World leaders have been advised to man their devices closely while the Australian public is on a code red alert for an eminent threat. Months after alleged Russian government backed hackersâ targeted NATO computers and European Governments […]
The security researcher Marco Vaz discovered a serious vulnerability in Belkin n750 router that could be exploited to gain root access on affected devices. A serious flaw in a Belkin router could be exploited locally by an unauthenticated attacker to gain full control over affected devices. The company has already issued a patch to fix […]
The attacks from humans against the humans as the preliminary phase of a bigger cyber attack will become harder to mitigate, let’s see how the cybercrime works. Standard incident response requires finding out the real extend of the incident. This is why we have all the monitoring tools where we can find any matching patterns. […]
A group of hackers supporting the ISIS hacked the Keighley Cougars rugby teamâs website, the attackers defaced the website with pro ISIS slogans. Keighley Cougars rugby teamâs website has been hacked by Islamic extremists, ISIS. Users who tried to the website on Sunday were met by a black web page featuring âHacked By Team System […]
Researchers at the Newcastle University discovered a flaw in contactless Visa cards that can be exploited to steal up to 1M from cardholders without the PIN. A group of researchers at Newcastle University in the UK has discovered a hole in Contactless Visa Cards that could be exploited by cyber criminals to steal $1M per Card without knowing their PIN. The contactless credit […]
Two models of Linksys routers running SMART Wi-Fi Firmware remain vulnerable to a pair of vulnerabilities recently patched by the company. Linksys EA2700 and EA3500 are the two routers running Linksys SMART Wi-Fi firmware that are still affected by a couple of vulnerabilities recently patched in different models of the Belkin-owned networking gear. On October 31th, […]
The DNS resolver implemented in the open source TCP/IP stacks uIP and lwIP is vulnerable to cache poisoning, the flaw could be exploited to divert traffic to malicious websites. The security researcher Allen D. Householder has reported  a serious vulnerability related to the uIP and lwIP DNS resolver, according to the Vulnerability Note VU#210620 it is exposed to cache […]
A Swedish security expert has discovered a serious  privilege escalation vulnerability in last Apple operating system, the OS X Yosemite. A Sweden white-hat has found a serious security flaw in Apple Yosemite OS X that could be exploited by an attacker to take control of your PC. The Swedish hacker Emil Kvarnhammar at security firm Truesec discovered a privilege […]
According to a UK motoring industry group and authorities keyless cars ‘increasingly targeted by thieves, which are using computers e dedicated equipment. According to a UK motoring industry group, criminal organizations are increasingly targeting high-end cars with keyless security systems.  The Society of Motor Manufacturers and Traders (SMMT) confirmed that car thieves are using dedicated equipment to access […]