The Iranian group defeated the very basic phenomenon of an iPhone Fingerprinting scanner which allows them to hack TouchID with multiple Fingerprints also on iOS 7_0_2 . An Iranian group of iPhone Geeks managing the blog i-Phone.ir defeated the very basic phenomenon of an iPhone Fingerprinting scanner, which allows them to unlock an iPhone device with multiple […]
A fake Apple iMessage app for Android OS has been published on official Google Play app store for around one month and totaling at least 10000 downloads. A fake Apple iMessage app for Android platform is concerning mobile developers and security experts. The app was initially published on the Google Play store but it isn’t the Android version […]
A second iOS 7 Lockscreen vulnerability has been found a few days the first one was fixed by Apple. This time attackers can makes call from a locked iPhone. A new iOS 7 Lockscreen vulnerability has been discovered, the flow allows attackers with physical access to the phone to make calls, including international calls and calls to […]
iOS 7 vulnerability lets ill-intentioned with physical access to bypass iPhone’s Lockscreen to access mobile. Jose Rodriguez has found a lock screen vulnerability in iOS 7, last version of popular Apple mobile OS system. Mr Rodriguez is a 36 year old soldier living in Spain’s Canary Islands, has found a security vulnerability in iOS 7 that allows […]
Linux Torvalds during last LinixCon admitted to have received pressure from US Intelligence to insert a backdoor into Linux. Linux Torvalds during a question-and-answer session at the LinuxCon publicly admitted that the US Government requested him to insert a backdoor into Linux kernel. The circumstance must induce a reflection in all those experts that believe open […]
It is very easy to hack the Nasdaq according the security expert Kolochenko that reported numerous vulnerabilities in the official website of the exchange. Just 10 minutes could be sufficient for an attacker to hack the Nasdaq Stock Market, this is the alert provided by Ilia Kolochenko, head of Swiss information security company High-Tech Bridge. The security expert […]
Imperva security researchers observed Web attacks involving PHP SuperGlobal variables are gaining popularity within the hacking community. Security researchers sounded the alarm for the possible abuse of PHP SuperGlobal variables by attackers, it is very frequent to read on PHP application that are hacked cyber cybercriminals. Security experts from Imperva sustains that PHP applications are vulnerable due the […]
Security researchers at Fox-IT firm found evidence that the spike in Tor traffic is caused by a Mevade botnet that hides its C&C in the anonymizing network. Is the Mevade malware the real responsible for the spike observed in the number of users directly connected to the Tor network? In an article I wrote recently I analyzed the impact on the use […]
Revelations on Bullrun program demonstrated that NSA has capabilities against widely-used online protocols such as HTTPS and encryption standards. The latest nightmare for US Administration is named Bullrun, another US program for massive surveillance. Snowden‘s revelations represented a heartquake for IT security, the image of NSA and US IT companies are seriously compromised such the trust of worldwide […]
Hesperbot is the name of a new banking trojan detected by ESET, it is a very potent malware which includes some very advanced tricks. Hesperbot is the name of the last banking trojan detected by security firm ESET, a malware that due its effectiveness could create serious problems to banks and financial institutions. Just yesterday I wrote about the evolution of cyber threats targeting online banking services, […]