A widespread internet disruption occurred in Japan on Friday, Google error it the main cause of the Internet outage that caused the panic in the country. Google error it the root cause of a widespread Internet outage in Japan that lasted for about an hour on Friday, August 25. The incident was caused by a BGM […]
A security researcher presented a small hardware named Icarus box that is able to hijack a variety of popular drones mid-flight. It could be very easy to hijack nearly any drone mid-flight by using the hardware presented by the Trend Micro researcher Jonathan Andersson at the PacSec hacking conference in Japan this week. Andersson, who leads […]
A Chinese security researcher has discovered a Windows design flaw dubbed BadTunnel that affects all versions of Windows. The Chinese researcher Yang Yu, director of Xuanwu Lab of Tencent has discovered a design flaw in Microsoft Windows that affects all versions of the popular operating system. The vulnerability could allow an attacker to hijack a target organizationâs […]
The IBM expert Nils Rodday revealed how to hack drones with just a $40 hardware from 2 km away by replicating its signals and blocking legitimate operators. At the Black Hat Asia hacking conference, the IBM expert Nils Rodday revealed that hackers can hijack expensive professional drones from 2 km away by replicating its signals and blocking legitimate […]
An expert presented his study on hijacking high-end drones commonly deployed by government and law enforcement agencies. The researcher Nils Rodday presented at the annual RSA conference in San Francisco the findings of its study on hacking drones. Rodday, who currently at IBM, has conducted his research while working as a graduate researcher at the University of Twente […]
My participation at the World Insight on CCTV discussing the Federal Aviation Administration regulation for the commercial  drones. Q1 First of all, the Federal Aviation Administration gave a very compressed timeline. Theyâre asking a expert panel task force to make registration guideline recommendations by November 20 and these recommendations implemented by mid-December, so that 1 […]
Sucuri has noticed a spike in the number of compromised websites as part of a malware campaign which relies on thousands of compromised WordPress sites. According to security experts at Sucuri, threat actors have hijacked thousands of websites running the WordPress CMS to serve malware. The technique is not new, legitimate compromised websites host malicious […]
The security expert Egor Homakov from Sakurity firm has released the Reconnect tool that allows hackers to hijack accounts on sites that use Facebook logins. The security expert Security Egor Homakov has developed a hacking tool dubbed Reconnect that exploit a flaw in Facebook to hijack accounts on sites that use Facebook logins. Homakov, with works for […]
Security Expert Brett Buerhaus has discovered a critical flaw  on admin.google.com, which could be exploited by to Hijack an account and disable 2FA Authentication. Even the giants have their Achilles heel, the Google Apps administrator console is affected by a critical cross-site scripting (XSS) vulnerability that could be exploited by attackers to force a Google Apps admins […]
The news is sensational, to take control of a plane is not necessary a group of terrorists, a hacker with limited resource could take control on the entire control system, including plane navigation and cockpit systems according the researcher Hugo Teso. Teso is a security consultant at  N.runs AG, Germany, with a passion for flying in […]