US and UK Will Simulate a Cyber Attacks on nuclear plants in 2016
US and UK are planning to simulate a cyber attacks on nuclear plants, to test their resilience in the light of the nuclear security summit. In the light of the recentRead More →
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.
US and UK are planning to simulate a cyber attacks on nuclear plants, to test their resilience in the light of the nuclear security summit. In the light of the recentRead More →
The Rokku Ransomware is a new infection currently being spread in email attachments. When infected, a victim’s data files will be encrypted and then ransomed back for .24 bitcoins or approximatelyRead More →
Two of security researchers have shown how hackers can target connected lightbulbs to exfiltrate sensitive data from Air-Gapped networks. Two of security researchers from the Weizmann Institute have shown howRead More →
Petya is different from the other popular ransomware these days. Instead of encrypting files one by one, it denies access to the full system by attacking low-level structures on theRead More →
Hacker tried to warn the company about their security issue but was ignored, so he used it against them. A hacker known under the name of TheNeoBoss apparently breached the PaperRead More →
Lauri Love faces extradition to US over hitting Federal Reserve, among others. At a court hearing earlier this month, the UK’s National Crime Authority (NCA) demanded that Lauri Love, a British computerRead More →
FOR THE PAST few years, Trevor Paglen has been at the vanguard of a movement of fine artists who have led gallery-goers to grapple with the realities of online privacyRead More →
A Columbian hacker claims he helped the candidate Enrique Peña Nieto in winning the Mexican presidential election in 2012. Until now we have seen something of similar only in the TVRead More →
Hacking like in the movies! Sometimes it’s that easy.If you ever want to impress your friends and hack doors with one command and a push of a button, like inRead More →
We have been alerted to a recent Steam scam, thanks to one gamer who is quick to inform her friends in the gaming platform’s Activity feed about her encounter withRead More →
Brazilian malware continues to evolve day by day, making it increasingly sophisticated. If you want to know how the various malicious programs work nowadays, you can jump to the correspondingRead More →
Android.Lockdroid ransomware expands to Asia by targeting Japan first. The malware poses as a system update and locks the device from use. One of the most prevalent Android ransomware threats inRead More →
Security researchers from SentinelOne have discovered a security vulnerability affecting the Apple System Integrity Protection (SIP). Security researcher Pedro Vilaça from SentinelOne has discovered a security vulnerability ( CVE-2016-1757) affectingRead More →
The United States Marine Corps has launched on March 25th a new hacker support unit named Marine Corps Cyberspace Warfare Group. It is unnecessary to remind the importance of cyber capabilitiesRead More →
Bash coming to Windows is huge news for developers, developers, developers. Microsoft is reaching out to Linux developers in a way that the company never has before. “The Bash shell isRead More →
A new ransomware called KimcilWare has been discovered that appears to be targeting web sites using the Magento eCommerce solution. It is currently unknown how these sites are being compromised,Read More →
PayPal has just fixed a security vulnerability that could have been exploited to send malicious emails to users via its platform. Researchers at security firm Vulnerability Lab have discovered a filter bypass and anRead More →
VNC Roulette allows you to randomly view insecure desktops accessible over the internet. Recently, a new website has come up on the Internet, which allows visitors to view random screenshots takenRead More →
Chinese state media is full of praise for the hacker accused of stealing a US F-35 Fighter Plane. A state-run media last Wednesday said that spying on the US is aRead More →
Paris terrorists used burner phones and US lawmakers have proposed a bill that would force retailers to record the identity of the buyers of these devices. Law enforcement and intelligence agenciesRead More →