Two men arrested for cryptocurrency robbery of up to $14M USD
The robbery would have been carried out thanks to a compromised SIM card Two men from Missouri were arrested last Monday under suspicion of having committed a SIM attack thatRead More →
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.
The robbery would have been carried out thanks to a compromised SIM card Two men from Missouri were arrested last Monday under suspicion of having committed a SIM attack thatRead More →
The youtubers lost their digital assets This in a new warning for blockchain investors. A hacker or hacker group allegedly has stolen 1.5k EOS (about $8.5k USD) owned by the Hodgetwins, a couple of famous YouTubers,Read More →
Lenovo has launched an alert for nine “high-risk” rated vulnerabilities that impact 20 network attached storage devices (NAS) sold by the company, including its LenovoEMC, Iomega, and other Lenovo-branded NAS devices,Read More →
The bad news continues for Facebook, as just hours after the social network reported on the attack they suffered, compromising the information of about 50 million users, a lawsuit was announcedRead More →
The lawsuit is due to the flaws in the identification cards issued by the company The Estonian authorities have taken legal action against the security company Gemalto, filing a lawsuit for €152M after security failures in citizen identification cards issued by the company were discovered, as reported byRead More →
This botnet redirects hijacked traffic to more than 50 active phishing sites More than 100k routers have suffered the modification of their DNS configuration to redirect users to phishing pages. Redirection occurs only when users try to access the online bankRead More →
Software for testing under authorization or for strictly academic purposes BYOB is an open source project that provides a framework for researchers and experts in ethical hacking to build andRead More →
After the attack that affected 50 million users, the hacker has changed his plans Facebook reported a security incident that affected about 50 million users on Friday, September 28, just a day after a Taiwanese hacker claimed that he was preparing toRead More →
A security investigator discovered the flaw Dhiraj Mishra, researcher on cybersecurity and ethical hacking discovered a default configuration in Telegram that could expose the IP address of its users when calls are made this way.Read More →
What could be worse than a million Facebook accounts hacked? 50 million Facebook accounts hacked The social media giant issued a press release on the morning of last Friday detailing a potentially damaging situation for the billions of people who use Facebook on aRead More →
A new way to steal payment cards data has triggered alerts on banks Specialists in ethical hacking from the International Institute of Cyber Security report that the US Secret Service is warning financial institutions about a new way to force ATMs that involves cutting several holes in these devices and then use a combination of magnets and medical devices to extract data from customer accounts directly from the card reader inside the cashier. According to a security alert distributed to banking institutions privately, the Secret Service has received multiple reports on a complex form of skimming in which malicious agents invest several days to perform. This type of attack, known as “ATM Wiretapping” begins when thieves use a drill to make a relatively largeRead More →
Bad news for the tech giant Pangu, a hacker group established in China, is back and once again has surprised everyone with a jailbreak for iOS 12, operating system that runs on the new iPhone XS, theRead More →
Instagram, Spotify, Airbnb or Tinder accounts could be compromised by Facebook hacking Many experts in ethical hacking believe that the UK Conservative Party has made serious mistakes and omissions in legislation on cybersecurity, but the mistakes of thisRead More →
A questionable practice by the social network giant Asking users’ phone numbers and then using them for advertising campaigns, this is just one more in the long list of deceptiveRead More →
An error has been discovered in all modern WiFi routers that cannot be solved Specialists in ethical hacking and cybersecurity at the University of California reported the discovery of aRead More →
Lack of authentication in Apple’s device enrollment program would allow attackers to get WiFi and VPN configuration passwords According to specialists in ethical hacking, companies that use Apple’s Device EnrollmentRead More →
Pirate content is being used to distribute malware The episodes of Game of Thrones are the most popular bait used by malicious agents seeking to capitalize on the spread ofRead More →
Countries around the world adapt their laws to current demands for data protection The European Union’s General Data Protection Regulation (GDPR), which has took effect since last May, has renewedRead More →
Vulnerability persists in different Linux distros Multiple Linux distributions (distros), including all current versions of Red Hat Enterprise Linux and CentOS, contain a recently disclosed vulnerability that provides attackers withRead More →
A researcher found a lot of information about the international organization Many of the national leaders meeting this week in New York for the United Nations General Assembly should beRead More →