Documents demonstrate NSA continued mass surveillance
Newly disclosed documents show that the NSA had found a way to continue spying on American citizens’ email traffic from overseas. The NSA continued to spy on the email messagesRead More →
Newly disclosed documents show that the NSA had found a way to continue spying on American citizens’ email traffic from overseas. The NSA continued to spy on the email messagesRead More →
Hidden analytics code tracks everything users do, EVERYTHING Analytics code deeply hidden in popular Google Chrome extensions is being used to track users across the Web, in different browser tabs,Read More →
Root certificate debacle that hit Lenovo now visits the House of Dell. In a move eerily similar to the Superfish debacle that visited Lenovo in February, Dell is shipping computersRead More →
In the wake of the Paris attacks, the vigilante hacker group Anonymous has declared war on so-called Islamic State using the internet and claims to haveshut thousands of Twitter accountsRead More →
ISIS hijacks Kuwait security firm’s OPSEC manual.Yesterday, various Twitter accounts were tweeting about an ISIS OPSEC manual describing the terrorist group’s cyber-security practices. The document, embedded below in a translatedRead More →
PowerView is a PowerShell tool to achieve network information on Windows domains for cyber security services and ethical hacking training professionals. It implements diverse practical meta-functions, including some user-hunting functionsRead More →
Log wipers, timestompers may have helped hackers stay quiet in terabyte raids. Damballa researchers Willis McDonald and Loucif Kharouni say the attackers who flayed Sony Pictures with disk-cleansing malware mayRead More →
We have received a lot of reports about a new ransomware that we are calling CryptInfinite based on the Windows Registry key created by this ransomware. Other sites have also been calling this ransomware DecryptorMaxRead More →
Hacking group remains as focused as one week ago Quite a lot has happened after Anonymous declared cyber-war on ISIS members last weekend, but now, after a week passed fromRead More →
ONLINE AD NETWORKS and search engines love it when you surf around. Everything you do—every page you load, every query you type—helps them build a profile of you, the betterRead More →
VMware has patched an information disclosure vulnerability affecting a number of its products that use Flex BlazeDS. The original vulnerability was discovered and disclosed in August by Matthias Kaiser ofRead More →
Rohit Jawa fools officer into revealing personal details. Police officers investigating an eBay scammer must have been very surprised when the criminal, in a bold act of courage, stole their identitiesRead More →
Starwood Hotels & Resorts Worldwide Inc said payment systems at 54 of its hotels in North America had been infected with a malware designed to collect payment card data. ARead More →
Even factory reset cannot smite the foulness that is Shedun. Michael Bentley of security-through-analytics outfit Lookout has found android malware that does not require user permission to install. Bentley, Lookout’sRead More →
Developers at LinkedIn fixed a persistent cross site scripting vulnerability in the social network this week that could have been exploited to spread a worm on the service’s help forums.Read More →
Brazilian whacks Arris for easy-t-o-guess default password, fix promised fast. Security bod Bernardo Rodrigues has found a backdoor-within-a-backdoor affecting some 600,000 Arris cable modems. The broadband kit company said, inRead More →
In this post, we will take a high and low-level look at the Pony Trojan, delivered through a recent spam campaign. During our case study we showed some malicious samples being distributed in spamRead More →
Mac malware is a thing. It’s real. Granted it hasn’t reached the critical mass of malicious code for Windows, but recent encounters with WireLurker, XcodeGhost and YiSpecter among others haveRead More →
How dare they demand we do exactly what we demand of them! The foreign rotters. A report laid before the US Congress yesterday encouraged lawmakers to allow American companies respondingRead More →
Telegram, the popular instant messaging service that offers end-to-end encryption, announced on Wednesday that they have “blocked 78 ISIS-related channels across 12 languages.” The company introduced channels in September 2015,Read More →