• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • SunTrust unfaithful employee may have stolen data on 1.5 Million customers
  • Experts spotted spam campaigns delivering XTRAT and DUNIHI backdoors bundled with the Adwind RAT
  • Security Affairs newsletter Round 159 – News of the week
  • Unscrupulous crooks behind the RansSIRIA Ransomware try to exploit attentions on Syrian refugee crisis
  • AlienVault presents OTX Endpoint Threat Hunter, its innovative free endpoint scanning service
  • Twitter bans Kaspersky from advertising its products through its platform
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Hacking (Page 314)

Hacking

Serious WhatsApp flaw allows decrypting user messages

A serious vulnerability in WhatsApp allows anyone who is able to eavesdrop on WhatsApp connection to decrypt users' messages. A new security issue concerns users of the popular Whatsapp, the mobile application for instant messaging platform. The popularity...

October 11, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Blackhole author arrested. The impact on the underground market

The author of the Blackhole exploits kit has been arrested after a long investigation. What will change in the offer of the criminal underground? The author of the popular Blackhole exploit kit, also know as Paunch, has been arrested. The cybercrime...

October 10, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware  Security 

How to exploit iFramed based traffic E-shop for illegal activities

What is an E-shop for iFramed traffic and how does cybercrime exploit it? In this post thanks to the investigation of the incredible Dancho Danchev I'll try to answer to these questions. On numerous occasion I remarked the need to carefully observe...

October 8, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware 

New iOS 7 flaw allows attacker to hijack Apple ID through spoofing fingerprints

German firm SRL has found another serious security issue in iOS 7 that allows an attacker to access the iPhone and potentially gain control over owner Apple ID New security issues for iOS 7, a new vulnerability in TouchID Fingerprint Scanner and iCloud has...

October 7, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Internet of Things, new opportunities for hackers and cybercriminals

Internet of Things, a business growing at a compound annual rate of 7,9% that is a privileged target for hackers and cyber criminals. The Internet of Things refers all objects in daily life equipped with identifiers that allow their automatic inventory....

October 7, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

How NSA tries to compromise Tor anonymity. Tor Stinks document

Top-secret presentation Tor Stinks leaked by Snowden shows the techniques implemented by the NSA to overwhelm Tor Anonymity with manual analysis. Tor anonymity has been debated many times, according to majority security experts it was one of the most...

October 6, 2013  By Pierluigi Paganini   Posted In  Hacking  Intelligence  Security 

Adobe security breach,hackers steal 2.9M accounts and source code

Adobe reveals customer data stolen in security breach, hackers have accessed sensitive information for 2.9 million users and to the source code of many products. Adobe Systems Inc has warned that customer data stolen in a security breach. According...

October 4, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

Android Firefox browser app flaw allows data stealing from SD card

Vulnerability In Android Firefox browser app allows hackers to steal user's files from the SD Card And Firefox's Privately Stored Data. Androidpolice blog reported that security researcher Sebastián Guerrero discovered an Android Firefox...

October 2, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

New TouchID hack by Iranian team works also on iOS 7_0_2

  The Iranian group defeated the very basic phenomenon of an iPhone Fingerprinting scanner  which allows them to hack TouchID with multiple Fingerprints also on iOS 7_0_2 . An Iranian group of iPhone Geeks managing the blog i-Phone.ir defeated...

September 29, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Iran hacked US Navy Computers

US officials revealed that Iran hacked unclassified Navy computers in recent weeks in an escalation of cyber attacks against US infrastructures. The Wall Street Journal reported that Iran hacked unclassified US Navy computers, the allegations were...

September 29, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Security 


« First‹ Previous310311312313314315316317318Next ›Last »
Page 314 of 343




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More