Bio hacking – technology and humans have never been so close, they complement each other. But what are the security and privacy risks? IS BIOHACKING A SECURITY RISK? Imagine a world where our day to day activities like door locking, supermarket purchases, credit card swipes and smartphone usage are replaced by just one chip embedded […]
Three German students have discovered that tens of thousands of MongoDB databases running as a service or website backend were exposed on the Internet. MongoDB is a cross-platform document-oriented database which uses JSON-like documents with dynamic schemas (BSON) improving the integration of data between different applications. MongoDB is very popular for scalability, performance and high availability, it represents […]
Security experts at BitDefender demonstrated how is possible to access data exchanged between a smartwatch and a smartphone via Bluetooth. The paradigm of Internet of Things is influencing modern society and the way it approaches the technology in everyday life. An impressive amount of Intelligent devices surround us, but often we ignore the repercussion in term of security and privacy. […]
As we look forward to 2015, it’s had to forget the complex bugs, data breaches and Privacy violations that have marred the Tech world in the ending year. Symantec Security firm now projects doom for 2015, warning that attacks will get Smarter and sharper. It’s the end of the year, a perfect time to look […]
The DNS resolver implemented in the open source TCP/IP stacks uIP and lwIP is vulnerable to cache poisoning, the flaw could be exploited to divert traffic to malicious websites. The security researcher Allen D. Householder has reported a serious vulnerability related to the uIP and lwIP DNS resolver, according to the Vulnerability Note VU#210620 it is exposed to cache […]
Operation Distributed Dragons – Tiger Security firm has discovered a series of DDoS attacks from China and that appear as run by a structured organization. Security experts at the Italian Tiger Security firm have spotted a new wave of DDoS attacks that were originated in China and that appear as run by well organized APT. The expert identified […]
Two researchers analyzed Smart meters widely used in Spain and discovered that can be hacked by attackers to harm the overall National power network. Internet of things devices are becoming a privileged target of cyber criminals, recently Akamai disclosed the existence of the Spike botnet which used by bad actors to run DDoS attacks through desktops and IoT devices. Another report issued by the same vendor […]
Researchers at Akamai firm have issued a report on reflection and amplification DDoS attacks exploiting vulnerable UPnP devices worldwide. Researchers at Akamai firm have observed an increase of new reflection and amplification DDoS attacks exploiting Internet of Things devices (e.g. SOHO devices, routers, media servers, web cams, smart TVs and printers), which that misuses communications protocols. The […]
Apple has just released its patch for the Shellshock vulnerability. The company provided an update for the OS X Lion, Mountain Lion and Mavericks. A few days ago the Internet community was shocked by the revelation on a new critical flaw, dubbed Bash Bug, which affects the Bash component in billion of Unix and Linus […]
Jaime Blasco at AlienVault Labs explained that ShellShock vulnerability could be exploited to hack Voice over IP systems worldwide. The Shellshock Bash is monopolizing the debate on the Internet security in these days, every vendor is assessing its product to verify the impact of the critical vulnerability Bash Bug (CVE-2014-6271). Apple recently announced that its Mac OS X based […]