Stealth Cell Tower, how to spy on workers with a harmless printer
Stealth Cell Tower, it is an antagonistic GSM base station concealed in an office printer that could be used for surveillance purposes. Are you angry with your boss or yourRead More →
Stealth Cell Tower, it is an antagonistic GSM base station concealed in an office printer that could be used for surveillance purposes. Are you angry with your boss or yourRead More →
Executive vice president of Microsoft’s Windows and Devices group revealed that Windows Kernel zero-day recently disclosed was used by the Fancy Bear APT. On Oct. 31, the Google Threat AnalysisRead More →
Security researchers warn that a bogus Flash Player app aimed at Android mobile devices has surfaced and is luring victims to download and install banking malware that steals credit card information andRead More →
The information about a 0-day SAP vulnerability was published on LinkedIn on October 28, 2016. A researcher disclosed details of the vulnerability in SAP system that he had identified andRead More →
When a site gets hacked, the attack doesn’t end with the malicious payload or spam content. Hackers know that most website administrators will clean up the infection and look noRead More →
Verint’s Cyber Research team has discovered an unknown variant of the Nymaim malware family, a group of threats that are also capable of downloading various malicious payloads onto the affected device,Read More →
Yet another privacy coalition is urging WhatsApp to clarify that user information shared between the company and Facebook is compliant with data protection laws on the books in Europe. The ArticleRead More →
A Windows zero-day vulnerability is being used in an unknown number of attacks, Google disclosed today, 10 days after it privately reported the issue to Microsoft. Google’s disclosure follows itsRead More →
Shadow Brokers identifies hundreds of organizations it claims were hacked by NSA. Shadow Brokers—the name used by a person or group that created seismic waves in August when it publishedRead More →
AT&T has been data-mining and willingly sharing user phone data, through its “Hemisphere” Project, which is essentially a mass surveillance program. The NSA may be the well-known governmental entity notoriousRead More →
Sometimes, during security audits, we may encounter a situation where everything is being managed correctly. In other words security patches, policies, network segmentation, antivirus, and user awareness, to name just aRead More →
18-year-old suspect characterizes it as a prank, but police aren’t laughing. Authorities said they arrested an 18-year-old iPhone app developer on charges of felony computer tampering after he unleashed codeRead More →
Short Bytes: Hacktivist group Anonymous has shared a new video and highlighted the strong possibility of World War 3. The collective says that the WWIII is coming soon, citing differentRead More →
Security researchers discovers IRCTelnet malware. A new malware family written by what appears to be an experienced coder is aiming for Linux-based IoT devices, with the main purpose of addingRead More →
HackForums.net has shut down its “Server Stress Testing” section. An online hackers’ forum has deleted a section that allegedly offered paid distributed denial-of-service attacks, following last Friday’s massive internet disruption.Read More →
Security researchers have discovered flaws in the Mirai botnet that might be used to mitigate against future attacks from the zombie network. Scott Tenaglia, a researcher at endpoint security firmRead More →
The young hacker Mys7erioN announced to have hacked into the database of a US organization, the Michigan State University. Data leaked online. Today I was contacted via Twitter by Mys7erioN who revealedRead More →
The malware world continues to develop rapidly and dynamically. On a daily basis new malware appears, accelerating the cat-and-mouse game between attackers and defenders. As a result, it’s more importantRead More →
Rex incorporates some features from the Mirai malware. The Rex Linux malware is not as widespread and efficient as initially thought, and currently, the multi-featured Rex malware is only inRead More →
At the 2016 mobile Pwn2Own event, held on Oct. 26 in Tokyo, security researchers were able to exploit devices that vendors had fully patched. In total, Trend Micro’s Zero DayRead More →