Thermal trace of the keyboard can be used in computer attacks
A new type of attack would allow a malicious actor to capture the keys pressed on a keyboard using a thermal camera. The discovery was made by pentest experts at the UniversityRead More →
A new type of attack would allow a malicious actor to capture the keys pressed on a keyboard using a thermal camera. The discovery was made by pentest experts at the UniversityRead More →
The New Zealand Court of Appeal upheld a decision by a lower court that found that Internet icon Kim Dotcom may be extradited to the United States to face various intellectual propertyRead More →
An NSO Group ex employee, one of the most powerful hacking companies in the world, has been arrested and charged for stealing company’s phone hack tools and trying to sellRead More →
It could take a long time until cases are heard. The UK government has announced the establishment of a specialized court to hear cases related to cyber crime, as reported byRead More →
Pentest specialists discovered a malware piece that infects systems with ransomware cryptocurrency mining programs, depending on equipment specifications and configuration, to decide which of the two attacks could be more profitable.Read More →
Siemens warns of the presence of six vulnerabilities in some of its SICLOCK central clocks, which synchronize the time in industrial environments, as reported by specialists in pentest from theRead More →
Some recommendations for pentest specialists seeking security failures in iOS operating system apps. As our phones play a more relevant role in our daily lives, releasing secure apps hasRead More →
A record cryptocurrency amount has been stolen from online wallets throughout the first half of 2018, as reported by pentest experts. CipherTrace, an information security and pentest firm, mentionsRead More →
The company requests the concerned users to contact them directly. Users report that a bug present in several models of Samsung smartphones makes their photos being sent by message to their storedRead More →
Enjoy safe use of WiFi during your travels. Do you know that feeling of losing a flight or when there is a delay and there is nothing you canRead More →
Another day, another data violation; Adidas believes that hackers have not been able to access to credit card information or health and fitness data from customers. Adidas, one of theRead More →
Pentest specialists report that Hamas has been accused of leading an elaborated spyware operation designed to involve Israeli Defense Force (IDF) soldiers to download malicious applications. A large number of soldiersRead More →
The security agency is eliminating millions of phone calls and text messages records dating for technical failures. The U.S. National Security Agency (NSA) announced that it is eliminating hundreds of millionsRead More →
Although Google has promised better privacy measures to its users, reports from Wall Street Journal suggest that thousands of application developers have access to Gmail users’ private messages. TheseRead More →
A group of pentest researchers has demonstrated ability to passively identify session details and perform hijacking, allowing phishing attacks. According to the International Institute of Cyber Security, researchers have found vulnerabilities inRead More →
A hacker managed to download voter’s information. The Tasmanian Electoral Commission states that an attacker still unknown gained access and downloaded a backup file containing voters’ information such as names,Read More →
The sale of zero-day exploits is a very profitable business that most people completely ignore. The International Institute of Cyber Security talks about this practice using the example of Zerodium,Read More →
LTE was supposed to fix security and privacy shortcomings—now it’s broken, too. The Long Term Evolution mobile device standard used by billions of people was designed to fix many ofRead More →
Researchers have found a new variation of the Rowhammer attack technique they have dubbed RAMpage. The vulnerability could allow an adversary to create an exploit to gain administrative control overRead More →
Smartphone’s batteries are a smart device themselves, smart enough to store information about how people use their phones to implement energy-saving mechanisms that result in a higher smartphone performance. TheseRead More →