Happy BirthDay Security Affairs! Three years together, it all began the 11/11/2011, a dream that becomes more and more real every day with your loving support. And it is just the beginning! I’m very happy and proud to be here with you for the third year of SecurityAffairs. We are a growing community that has tens of […]
Telstra to pay a whopping $18,000 fine for listing the contact information of a Sydney Judge without his consent. The Australian Telco contravened the Privacy Act and risked the safety of the Judge who has since applied for an interstate transfer due to security concerns. Australia’s telecommunication giant, Telstra to pay a whopping $18,000 fine […]
Researchers at the Newcastle University discovered a flaw in contactless Visa cards that can be exploited to steal up to 1M from cardholders without the PIN. A group of researchers at Newcastle University in the UK has discovered a hole in Contactless Visa Cards that could be exploited by cyber criminals to steal $1M per Card without knowing their PIN. The contactless credit […]
Two models of Linksys routers running SMART Wi-Fi Firmware remain vulnerable to a pair of vulnerabilities recently patched by the company. Linksys EA2700 and EA3500 are the two routers running Linksys SMART Wi-Fi firmware that are still affected by a couple of vulnerabilities recently patched in different models of the Belkin-owned networking gear. On October 31th, […]
The DNS resolver implemented in the open source TCP/IP stacks uIP and lwIP is vulnerable to cache poisoning, the flaw could be exploited to divert traffic to malicious websites. The security researcher Allen D. Householder has reported a serious vulnerability related to the uIP and lwIP DNS resolver, according to the Vulnerability Note VU#210620 it is exposed to cache […]
Chinese authorities unveil the development of a new highly accurate laser defense system that is able to shoot down small drones in a few seconds. The Chinese Government has completed the development of a new weapon that is able to hit and shoot down small drones and aircraft in a few seconds. The China has successfully tested a highly […]
A Swedish security expert has discovered a serious privilege escalation vulnerability in last Apple operating system, the OS X Yosemite. A Sweden white-hat has found a serious security flaw in Apple Yosemite OS X that could be exploited by an attacker to take control of your PC. The Swedish hacker Emil Kvarnhammar at security firm Truesec discovered a privilege […]
The ISIS has released a manual for its militants, titled “How to Tweet Safely Without Giving out Your Location to NSA”, that explain how avoid surveillance. Security and media consider the ISIS a group with great cyber capabilities, last news of the IS is related to the diffusion of a Training Guide for its members to prevent the NSA spying. The […]
According to a UK motoring industry group and authorities keyless cars ‘increasingly targeted by thieves, which are using computers e dedicated equipment. According to a UK motoring industry group, criminal organizations are increasingly targeting high-end cars with keyless security systems. The Society of Motor Manufacturers and Traders (SMMT) confirmed that car thieves are using dedicated equipment to access […]
Which is the importance of the CyberEurope2014 organized by the ENISA? It is the largest and most comprehensive EU cyber-security exercise to date. Cyber security is considered today a pillar for the stability of any government, a growing number of cyber attacks every day hit private companies, government entities and critical infrastructure, these offensive appear even more […]