Revelations on Bullrun program demonstrated that NSA has capabilities against widely-used online protocols such as HTTPS and encryption standards. The latest nightmare for US Administration is named Bullrun, another US program for massive surveillance. Snowden‘s revelations represented a heartquake for IT security, the image of NSA and US IT companies are seriously compromised such the trust of worldwide […]
Hesperbot is the name of a new banking trojan detected by ESET, it is a very potent malware which includes some very advanced tricks. Hesperbot is the name of the last banking trojan detected by security firm ESET, a malware that due its effectiveness could create serious problems to banks and financial institutions. Just yesterday I wrote about the evolution of cyber threats targeting online banking services, […]
The majority of financial service professionals considers Man In The Browser as the greatest threat to online banking, cybercrime increases its use. Man In The Browser attack, DDoS attacks, phishing are most insidious cyber threats against banking institutions. Last statistics proposed by principal security firms confirm that online banking is considered a lucrative business for […]
Security researcher Ian Malloy has identified a new group of hackers dubbed The Al Assam AlaikumCyber Unit linked to recent discoveries on RBN. Security researcher Ian Malloy has been studying facebook.com for several years, watching as the company released product after product and used the hacker business model of ‘build fast and break things.’ Now, […]
Experts at Kaspersky firm provided evidences that the hackers behind cyber espionage campaign NetTraveler are still active and improved their attack methods. Last June Kaspersky firm uncovered a new global cyber espionage campaign dubbed NetTraveler. Kaspersky’s team discovered that NetTraveler targeted over 350 high profile victims from 40 countries. The name of the operation derives from […]
The researchers led by Aaron Johnson of the Naval Research Laboratory published the paper on Traffic Correlation Attacks against Anonymity on Tor. Anonymity on Tor network is the primary reason for the use of the popular network, hacktivists, whistleblowers, hackers, and cybercriminals are enticed by the possibility to be not traceable. Straying far from prying eyes is the primary attraction for the user of Tor project. In reality […]
Researchers at last USENIX security symposium presented a new method and consolidated techniques for reversing Dropbox code to bypass Dropbox’s two factor authentication, hijack Dropbox accounts and intercept SSL data. Reversing Dropbox analysis allowed researchers to crack its open cloud storage service, reverse engineering the encryption protecting the client it is possible to open it up […]
The article proposes the analysis of the impact on the use of the Tor network after the events related to PRISM surveillance program disclosure. The use of Tor Network to preserve user’s anonymity and to avoid government surveillance, we discussed this topic several times explaining that through the analysis of Tor metrics data it was possible to […]
Former LulzSec leader Sabu (Hector Xavier Monsegur) accused by the hacker Jeremy Hammond to have incited state-sponsored attack for the U.S. Government. LulzSec was a popular group of hacktivists that breached many high profile targets during the last years, we all remember the Sony Pictures occurred in 2011. The group also claimed responsibility for taking down many other […]
The group of Syrian Electronic Army hackers is intensification its hacking campaign pro-Assad. Details of the attacks against the HuffingtonPost UK, Twitter and the NYT. The Syrian Electronic Army once again successful in an attack, to be precise the popular group of hacker this time hacked into Twitter, Huffington Post and NY Times’ registry accounts modifying DNS records and […]