• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • VMware addresses ESXi issue disclosed at the Tianfu Cup hacking competition
  • CVE-2019-14899 flaw allows hijacking VPN connections on Linux, Unix systems
  • OpenBSD addresses authentication bypass, privilege escalation issues
  • China used the Great Cannon DDoS Tool against forum used by Hong Kong protestors
  • CyrusOne, one of the major US data center provider, hit by ransomware attack
  • The evolutions of APT28 attacks
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Breaking News (Page 651)

Breaking News

Wikileaks: NSA spying on top German officials for economic reasons

Wikileaks reveals an extended economic espionage activity conducted by the NSA in Germany, the spies were particularly interested in the Greek debt crisis. Recently we spoke about the last collection of data disclosed by Wikileaks on NSA massive surveillance,...

July 3, 2015  By Pierluigi Paganini   Posted In  Breaking News  Intelligence  Security 

GDATA on Android malware. 4,900 new strains discovered every day

Every 18 seconds a new mobile Android malware is discovered in the wild as reported in the G DATA Malware Report Mobile for Q1 2015. Security firm GDATA has published a report on mobile malware detected in the first quarter of 2015. The researchers...

July 3, 2015  By Pierluigi Paganini   Posted In  Breaking News  Malware  Mobile  Reports 

ProxyHam, a killer application to protect online anonymity

ProxyHam is a hardware device designed by a group of researchers to allow anonymous connections to Wi-Fi from about 2.5 Miles away. Security researcher Benjamin Caudill has designed a device that allows to keep anonymous users online experience,...

July 2, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking 

Unknowns are cloning and booby trapping hundreds of Dark Web sites

Founder of the ahmia.fi project reported that someone is cloning and booby trapping hundreds of Dark Web sites and is re-writing some of the content. The "ahmia.fi" project census Dark Web websites, aka hidden services, by providing search engine functionalities...

July 2, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Security 

The FBI Most Wanted hackers. Law enforcement is willing to pay $4.2 million to get them

FBI has published the lists of most wanted hackers, the rewards for their capture reach $4.2 million. They have stolen hundreds of millions of dollars. Cybercrime represents one of the most serious threat to Governments and private industries worldwide,...

July 2, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime 

Flaw in 802.11n opens wireless networks to remote attacks

Researchers discovered a vulnerability in the 802.11n wireless networking standard that could be exploited by a remote attacker to target wireless networks. According to researchers from the Expertise Centre for Digital Media at the Hasselt University...

July 2, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Security 

California: who is cutting Fiber-optic cable lines and why?

Law enforcement is investigating a series of mysterious attacks on the Fiber-optic cable lines in California. Who is behind these attacks? The FBI is investigating a series of mysterious physical attacks on internet cables in California. The investigators...

July 1, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Security 

Apple issues a fix for Masque Attacks, but apps are still open to hack

Although Apple has fixed the Masque Attack there are still other attack scenarios that an attacker can exploit in the installation process on iOS. A team of researchers at FireEye has revealed that the last update issued by Apple only partially fixed...

July 1, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Mobile  Security 

NIT, the Flash code the FBI used to deanonymize pedo’s on Tor

A look to the "NIT Forensic and Reverse Engineering Report, Continued from January 2015". NIT code was used by the FBI to deanonymize Tor users. On December 22nd, 2014 Mr. Joseph Gross retained the assistance of Dr. Ashley Podhradsky, Dr. Matt Miller,...

July 1, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking 

Dino Malware that targeting Iran belong to Animal Farm’s arsenal

Researchers at ESET analyzed the Dino malware confirming that the sophisticated espionage platform belongs to the arsenal of the Animal Farm APT. Security experts at ESET have analyzed Dino, a sophisticated platform used by the Animal Farm ATP group. Earlier...

July 1, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Intelligence  Malware  Reports 


« First‹ Previous647648649650651652653654655Next ›Last »
Page 651 of 700




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Necessary Always Enabled