A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. The Phantom Menace, who targeted the oil tankers? Hi-tech car thieves use £30 jamming devices in car parks Researcher who exploits bug in Starbucks gift cards gets rebuke, not […]
A security researcher has compiled the Ransomware Removal kit that could be used in the process of responding to ransomware infections. CryptoLocker, CoinVault, and TeslaCrypt are the names of some of the most dreaded ransomware that infected million of users worldwide. The extortion is a very common practice in the cyber criminal underground and ransomware are […]
The penetration tester Thiebauld Weksteen has published an interesting analysis to explaine the importance of robots.txt for the hacking activities. Thiebauld Weksteen, a penetration tester from Melbourne is advising system administrators that robots.txt can give precious details to hackers, when it comes to attacks, because robots.txt as the capability to tell search engines which directories […]
The computer security researcher Chris Roberts reported the FBI that he obtained the control of at least one commercial flight causing it to “climb”. A new search warrant filed in a federal court in New York state published Friday by the Canadian website APTN revealed that the aviation computer security researcher Chris Roberts reported the FBI that […]
According to a report published by the experts at root9B the hacking crew APT28 is planning to attack several financial institutions worldwide. In October 2014, security expert at FireEye published a report on the activities conducted by a group of Russian hackers, dubbed APT28, the hacking crew is behind long-running cyber espionage campaigns that targeted US defense contractors, European security organizations and […]
Security Researcher at CrowdStrike claims VENOM vulnerability leaves millions of virtual machines vulnerable to cyber attacks. A new security vulnerability dubbed VENOM (CVE-2015-3456) is threatening the security industry. The CrowdStrike Senior Security Researcher Jason Geffner who discovered the vulnerability explained that the flaw could be exploited by an attacker to compromise any machine is a data […]
Onapsis study found that over 95% of SAP systems are exposed to vulnerabilities that could lead to full compromise of the company’s business. SAP is one of the most popular enterprise software used by companies to manage business operations and customer relations. A recent study conducted by the SAP solutions provider revealed that more than 95 percent […]
According to data provided by British law enforcement, at least a 25 percent of organised criminals in the country is converting themselves to cybercrime. Cybercrime is becoming even more attractive to traditional crooks, including violent offenders. According to data provided by British law enforcement traditional crimes were continuing to fall while the number of online crimes […]
Hackers belonging to the Anonymous collective hacked the website of the World Trade Organization (WTO) and leaked personal data of thousands of officials. Hackers belonging the Anonymous collective compromised the website of the World Trade Organization (WTO) and leaked its database containing personal data of its members. The stolen data are related to personnel of […]
A few hours after the presentation of the Google Password Alert extension a researcher already have developed two methods to bypass it. A few hours ago, Google released the Password Alert extension that was designed to warn users when they are submitting their Google credentials to fraudulent websites. “Here’s how it works for consumer accounts. Once you’ve […]