The Government of the Kazakhstan makes it mandatory for its citizens to install rogue security certificates to monitor them online. The Government of the Kazakhstan plans to implement a new internet control policy for all the population starting from January 1st 2016, and to accomplish that will order the population to install some rogue security […]
A duo of security researchers, Daniel Komaromy of San Francisco and Nico Golde of Berlin, demonstrated how to intercept calls using bogus base stations. PacSec Modern Samsung devices, including the last generation Samsung S6, S6 Edge and Note 4, are vulnerable to phone eavesdropping. A duo of experts, Daniel Komaromy of San Francisco and Nico […]
A group of French researchers discovered how Fraudsters Stole nearly $680,000 Via MitM Attack on EMV Cards. On October 1st, EMV (Europay, MasterCard, Visa) cards have been introduced in the US to improve the security of payment card holders. EMV cards, also known as chip-and-PIN cards, rely on a cryptographic chip to improve security of banking transaction and avoid […]
Apple has removed mobile apps from the iOS Apple store that are installing root CA certificates that enable traffic to be intercepted. Apple has pulled several apps out from the official iOS App Store over SSL/TLS security concerns, this means that the security issues could allow threat actors to compromise encrypted connections between the servers […]
At the recent DEF CON hacking conference penetration testers demonstrated that Samsung smart fridge leaves Gmail logins open to attack. Once again Internet of Things raises security concerns, this time security researchers have discovered a way to steal users’ Gmail credentials from a Samsung smart fridge. At the recent DEF CON hacking conference, they presented a […]
Experts who are analyzing the Hacking Team internal emails discovered that the firm is working on the development of a weaponized drone. Security experts are continuing to dig the leaked internal emails from the Hacking Team, last revelation is related to the development of an unmanned aerial vehicle with the ability to run cyber attacks […]
Researchers have discovered a new TLS vulnerability dubbed LogJam that open a large number of online services to cyber attacks. Logjam is the name assigned to a new vulnerability that affects the Transport Layer Security (TLS) protocol putting a large number of online services at risk. Logjam vulnerability can be triggered through man-in-the-middle (MitM) attacks to […]
The Dark Web email service SIGAINT suffered a major attack that involved 70 exit nodes, a circumstance that suggests Government operation. Law enforcement and Intelligence agencies are always involved in the infiltration of Darknets and related services with the primary intent to monitor bad actors and de-anonymize users. The Tor-Based Dark Web Email Service SIGAINT is one […]
Researchers uncovered the Great Cannon, a powerful hacking tool, used by the Chinese Government to run MITM attacks, that was used also against GitHub. The researchers from the University of California at Berkeley and the University of Toronto have uncovered a powerful weapon of the Chinese Government cyber arsenal, dubbed the Great Cannon, used to […]
Security experts at Minded Security firm have recently discovered a flaw in the popular networking library for iOS and OS X AFNetworking. The researchers Simone Bovi and Mauro Gentile at the security firm Minded Security discovered a flaw in the popular networking library for iOS and OS X AFNetworking. The researchers found the flaw while were […]