The security expert Mohamed M.Fouad discovered several critical security vulnerabilities at Glassdoor, which can lead to very harmful impact on all users. The Independent Security Researcher Mohamed M.Fouad has discovered a lot of critical security vulnerabilities at Glassdoor that could lead to very harmful impact on all users. Mohamed M.Fouad an Independent Security Researcher from Egypt. I […]
More than 12 million devices are vulnerable to a simple attack that could compromise their home routers exploiting a vulnerability called Misfortune Cookie. More than 12 Million Home Routers are affected by a vulnerability called Misfortune Cookie that expose users to the risk of cyber attack. Researchers at Check Point Software Technologies reported the Misfortune Cookie flaw affects millions of devices running […]
This is a sad day for me, my friend and colleague Martin Dipo Zimmermann is passed away after suffering an heart-attack. Martin was the Chief Technical Officer and co-founder of the Cyber Threat Intelligence Network, I was working with him and other colleagues to threat intelligence activities. Martin was the Chief Technical Officer and co-founder of the […]
Vespid is amongst most the important espionage artifacts based on the Wireless Aerial Surveillance Platform for the for the construction of a DIY Spy Drone. The Wireless Aerial Surveillance Platform is a small DIY drone that has the capability to crack Wi-Fi passwords, eavesdropping on Wi-Fi passwords, eavesdropping on cell phone calls and read text […]
Sony Pictures is adopting various measures to contains damages including a “fighting back” activity against website that share the stolen data. We will talk about the Sony Pictures data breach for a long time, the cyber attacks conducted by the GOP hacking team is causing serious damages to the company. It is early to estimate the overall economic impact […]
Security experts at Sans Institute discovered a worm which exploits the popular Shellshock flaw to compromise QNAP systems in the wild. Experts at Sans Institute have discovered a new series of attacks in the wild exploiting the Shellshock attack code to compromise disk storage systems made by the Taiwan-based QNAP firm. The threat actors used […]
A newspaper discovers that bad actors are spying on cell phone communications of Norwegian politicians using the StingRay mobile surveillance equipment. The journalists of a daily newspaper in Norway have discovered a mobile phone surveillance equipment hidden around the Government and Parliamentary building and apparently there is no information on who has used it. Everyday we read about cyber […]
Cryptoy is the free educational app about cryptography designed by GCHQ for use by secondary school students and their teachers. The British Intelligence agency GCHQ has launched “Cryptoy”, an Android mobile app that was designed to encourage youngsters to tackle emerging cyber security threats, the Agency made it available to download today. The Cryptoy mobile app was developed by […]
Yesterday Pierluigi Paganini presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. Yesterday I presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. The presentation highlights the security and privacy issues for the […]
Microsoft recalls Exchange patch, it’s the second time in two months that Microsoft is recalling a security update published along with its patch Tuesday release. Microsoft has announced the recall of a security patch released to fix a problem in its Exchange Server. It is the second straight month that Microsoft has issued a critical […]