Security Experts at Trend Micro discovered a series of hacking attacks targeting Facebook users and exploiting the Same Origin Policy vulnerability. A serious security vulnerability affects the default web browser of the Android OS lower than 4.4, according the data provided by Google official dashboard nearly the 66% of Android devices is impacted. The security […]
Mobile developers behind the Logdog app have conducted a rapid survey to analyze the trend in the hacking of accounts for the principal web services. A few weeks ago I was contacted by LogDog, a company that has developed is free protection app from hacking attacks and identity theft, the developer asked me to try the […]
The popular social network has launched the Facebook Tor hidden service to provide a method to use its site securely. Write down the onion address! We discussed many times about the right to online anonymity and how anonymizing networks like Tor could protect it. The Tor Project is an Internet-traffic anonymization service that is able to anonymize the Internet […]
Facebook and Yahoo have designed an SMTP extension dubbed RRVS, Require-Recipient-Valid-Since, to prevent illegal use of emails with a new  ownership. Last year Yahoo announced the decision to reset any account that has not been used for 12 months, making them available to other users. The decision has raised several doubts for security and privacy issues, […]
The student Andrew Aude discovered a still unreleased feature for payments of Facebook Messenger by using the iOS and Mac OS X hacking tool Cycript. Facebook is preparing to enter the world of mobile payments according to a recent report published by Techcrunch. The student at Stanford, Andrew Aude discovered a still unreleased feature of Facebook Messenger by […]
Security experts at TrendMicro have uncovered a new malicious campaign based on a Chrome extension deployed on the official Chrome Store. A few months ago I wrote an article on the presence of a malicious Chrome browser extension, dubbed Cryptsy Dogecoin (DOGE) Live Ticker, available on the official store that was able to steal digital coins. […]
The Russian Prime Minister Dmitry Medvedev has signed a decree that will extend the use of SORM-2 to social network surveillance. Itâs known that the Russian Government is applying a strict surveillance on the Internet within the country, the Kremlin has developed a system code named âSORM-2â to monitor Russian citizens. The Russian Government has […]
Security Experts at Cheetah Mobile have uncovered a new scam based on a fake Facebook Color Changer App which infected 10000 users worldwide. Facebook  is a privileged target for cyber criminals, in many cases old fraud schema are proposed again by bad actors, it is the case of the bogus Facebook “Color Changer” app. Researchers at China-based Internet company […]
A security researcher disclosed a serious issue on Instagramâs Android Application which could be exploited by an attacker to impersonate a victim. A security issue related to Instagram Mobile App for Android expose the users’ account to serious risks of data breach. A security researcher discovered that the Instagram Mobile App is affected by a Hijacking vulnerability which could be […]
Experts from Cyphort Labs have discovered an extensive data theft campaign named Nighthunter that has been active since 2009 stealing victim’s credentials. Security experts at Cyphort firm have recently uncovered a five-year-old attack campaign dubbed NightHunter arranged to steal user credentials for Dropbox, Facebook, and other web services. The malicious campaign is cross sector, every industry […]