• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Must Read

  • Operation Triangulation: previously undetected malware targets iOS devices
  • California-based workforce platform Prosperix leaks drivers licenses and medical records
  • Apps with over 420 Million downloads from Google Play unveil the discovery of SpinOk spyware
  • BlackCat claims the hack of the Casepoint legal technology platform used by US agencies
  • Widespread exploitation by botnet operators of Zyxel firewall flaw
  • Experts warn of backdoor-like behavior within Gigabyte systems
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me

Home Archive by category Security (Page 347)

Security

The Hackers Conference 2013 – Hackers will Demonstrate Digital Dangers

This is the second edition of 'The Hackers Conference'. Following the huge success of the conference last year the current edition of the conference brings back to you all the knowledge, all the fun in a better, grander way! The Conference will be held...

August 18, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Android malware uses Google Cloud Messaging Service as C&C Server

Security experts at Kaspersky have detected numerous Android malicious applications that uses Google Cloud Messaging Service as C&C. Android malware exploits the Google Cloud Messaging Service (GCM) as Command and Control server. The Google...

August 16, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

Android wallet apps vulnerability could allow currency theft

Bitcoin.org has released a security advisory related to a serious security flaw related to Android wallet apps that could allow money theft. Yesterday I’ve written on RAT for Android today we will speak of a weakness in some Android wallet apps for the popular...

August 13, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Digital ID  Security 

AndroRAT drives the rise for DIY Android hacking tools

AndroRAT is just one of the numerous open-source tools that was created and published on the undergroud forums to allow the hack of Android mobile devices. AndroRAT is an open-source tool that was created and published on the Internet in November 2012,...

August 12, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

Vulnerability in Windows Phone OS could allow information disclosure

Microsoft Security Advisory reveals a vulnerability in Windows Phone OS that could allow information disclosure Microsoft has issued a security advisory related to a vulnerability in Windows Phone OS that could allow information disclosure, the flaw...

August 8, 2013  By Pierluigi Paganini   Posted In  Intelligence  Security 

Chinese Comment Crew caught taking over a fake Water Plant

Chinese Hacking Team Comment Crew caught taking over a honeypot simulating a Water Plant, the infinite offensive of Chinese Cyber Units linked to PLA. The Comment Crew group of hackers has been identified during an attack to a fake US control system...

August 7, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Facebook flaw allows the disclosure of Friends List

This POC demonstrates that exploiting a Facebook flaw it is possible the disclosure of Friends List EVEN WHEN HE HAS BLOCKED ACCESS TO VIEW IT This is a Proof of Concept made by BHAVESH NAIK DO YOU WISH TO SEE WHO IS IN YOUR FRIENDS LIST, EVEN WHEN...

August 5, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

FBI Android malware used for investigations

Former FBI officers revealed to the Wall Street Journal the existence of FBI Android malware that is used to spy on suspects for investigations. The FBI is using mobile Android malware to spy on suspects for its investigations, the news is not surprising...

August 5, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

Syrian Electronic Army hacked White House employees personal emails

At least three White House employees personal Gmail accounts hacked by the popular group of hackers knows as Syrian Electronic Army (SEA). White House employees personal email hacked, it is happened to three staffers that suffered data breaches on their...

August 1, 2013  By Pierluigi Paganini   Posted In  Hacking  Intelligence  Security 

Q2 2013 Superfecta report, constant increase for automated attacks

FireHost Secure cloud hosting company issued Q2 2013 Superfecta report that revealed a sharp increase in blended, automated attacks. FireHost announced the Q2 2013 Superfecta report, an interesting set of statistic related to attacks against web applications. The...

July 31, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Security 


« First‹ Previous343344345346347348349350351Next ›Last »
Page 347 of 397



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version