Security researcher Ian Malloy has identified a new group of hackers dubbed The Al Assam AlaikumCyber Unit linked to recent discoveries on RBN. Security researcher Ian Malloy has been studying facebook.com for several years, watching as the company released product after product and used the hacker business model of ‘build fast and break things.’Â Now, […]
Snowden revealed that NSA designed a system called XKeyscore considered the “widest-reaching” architecture for developing intelligence from the internet. XKeyscore, NSA former technicians Edward Snowden revealed that the agency has another secret program to spy on user’s Internet experience tracking practically every his activity … PRISM isn’t an isolated surveillance program. The NSA tool collects ‘nearly […]
Secret service agents of Intelligence agencies all over the world, such as Mossad, MI6 and NSA have plenty of options in accessing our data. The recent revelations by Edward Snowden about how the US secret service National Security Agency has massive access to almost everyoneâs data stored by the telecommunications and cloud service providers over […]
Chinese hackers who breached Google in 2010 are responsible for the recent violation to Google Companyâs Surveillance Database according officials revelations. Google data breach is reality and Google Companyâs Surveillance Database has been violated by the same hackers who breached Google’network in 2010, the attackers have obtained the access to the companyâs tracking system for […]
Governments, and in particular US one, are principal buyers of zero-day vulnerabilities according a report published by Reuters. Zero-days exploits are considered a primary ingredient for success of a cyber attack, the knowledge of zero-day flaw gives to the attacker guarantee of success, state-sponsored hackers and cyber criminals consider zero-day exploits a precious resources around […]
Google is a mine of information that could be used for various purposes, for this reason National Security Agency realized a book to help its spies uncover intelligence hiding on the web. Few days ago I published an interested article inspired by security expert Dancho Danchev and focused on the use of Google Dorks based tool […]
Continues my overview of the main security reports published by leading companies that produce interesting analysis on the analysis of cyber threats, today I desire to introduce the data proposed by Solutionary in the “2013 Global Threat Intelligence Report” (registration is required). The GTIR report provides insight into prevalent cyber threats identified in 2012 thanks […]
The year is start way for Oracle Java platform, a new Java 0-day vulnerability has been discovered and worldwide security community is very concerned on the potential effect of the bug. We have discovered how much dangerous could be the exploit of a zero-day vulnerability especially against institutional targets and governments (e.g. Elderwood project), state-sponsored hackers […]
Article published on The Malta Indipendent on December 9th 2012 Technology in the last decade has assumed a fundamental role in our daily lives. We are increasingly surrounded by discrete intelligent components designed to provide us with more sophisticated choices designed to enhance our personal experience and quality of life. From our phones, to our home […]
Article Published on The Hacker New Magazine â September Edition âSecurity in a serious wayâ Introduction The Deep Web (or Invisible web) is the set of information resources on the World Wide Web not reported by normal search engines, according a raw estimation of some security experts clear web represents only a small portion of the […]