Android Apps Capture Loudspeaker Data Without Any Permission

  • Juli 18th, 2019
  • admin

Source: TheHackerNews Spearphone Attack: Spy On Calls, Voice Notes, and Multimedia According to the researchers, the Spearphone attack can be used to learn about the contents of the audio played by the victim—selected from the device gallery over the Internet, or voice notes received over the instant messaging applications like WhatsApp. “The proposed attack can […]

Krisenfrüherkennung/Predictive Analytics

  • März 15th, 2019
  • admin

Ein Anwendungsgebiet der künstlichen Intelligenz (KI) mit Hilfe von Machine Learning, Deep Learning und anderer Methoden ermöglicht Vorhersagen künftiger Ereignisse bzw. Rückschlüsse zu Ursachen eines Ereignisses. Die zu Grunde liegenden Daten können vielfältig sein, in Bezug auf Qualität, Quantität und Art – einschließlich Medien-Daten wie Audio, Video und Text, sowie Sensor Daten, System Logs, etc. […]

Wikileaks Reveals CIA Malware That Hacks & Spy on Linux

  • Juli 1st, 2017
  • admin

WikiLeaks has just published a new batch of the ongoing Vault 7 leak, this time detailing an alleged CIA project that allowed the agency to hack and remotely spy on computers running the Linux operating systems. Dubbed OutlawCountry, the project allows the CIA hackers to redirect all outbound network traffic on the targeted computer to […]

WikiLeaks Reveals Athena Spying Programe Targeting All Windows Versions

  • Mai 19th, 2017
  • admin

WikiLeaks has published a new batch of the ongoing Vault 7 leak, detailing a spyware framework – which “provides remote beacon and loader capabilities on target computers” – allegedly being used by the CIA that works against every version of Microsoft’s Windows operating systems, from Windows XP to Windows 10. Source: The Hackers News Technology […]

Pawn Storm Operation Against CDU

  • Mai 13th, 2016
  • admin

Source: Security Affairs Security experts follow a long time the operations of the Russian-linked Pawn Storm cyber spies, aka APT 28, Sednit, Sofacy, Fancy Bear and Tsar Team. In October 2014, security experts at Trend Micro spotted a cyber espionage operation targeting military, government and media agencies across the world. A new cyber espionage operation targeting military, government and media agencies […]

Surveillance – How to secretly track cellphone users position around the globe

  • April 18th, 2016
  • admin

Source: Security Affairs Using the proper surveillance systems available on the market it is easy and quick to track cellphone and the movements of targets everywhere on the globe. We recently discussed about the decision of Wikileaks to publish copies of the criticized surveillance software FinFisher, highlighting the dangers for the militarization of the cyberspace and […]

How To Hacking the Firm HackingTeam

  • April 18th, 2016
  • admin

Source: Security Affairs In July 2015, the surveillance firm Hacking Team suffered a serious security breach, unknown attackers have exfiltrated some 400Gbs of data (including emails, internal documents, and exploit source code), but since now no news regarding the attack was disclosed. Now the hacker using the online pseudonymous ‘PhineasFisher‘ published a detailed explanation of how he has hacked the Italian surveillance […]

The 7 Most Wanted Iranian Hackers

  • März 25th, 2016
  • admin

Source: The Hackers News The Federal Bureau of Investigation (FBI) has lengthened its Most Wanted List by adding seven Iranian hackers who are accused of attacking a range of US banks and a New York dam. On Thursday, the United States Department of Justice (DoJ) charged seven Iranian hackers with a slew of computer hacking […]

22.000 Jihadis are Disclosed

  • März 10th, 2016
  • admin

A former ISIS member has stolen and disclosed thousands of documents reporting the identity of 22,000 Jihadis and other important information. Thousands of documents reporting the identity of 22,000 Jihadis are handed to Sky News by a former member… Source: SecurityAffairs

A “New” Ransomware In The Wild

  • Februar 20th, 2016
  • admin

Many security researcher and the German security agancy BSI identyfied a new ransomware named “Locky”. It encrypts your data using AES encryption and then demands .5 bitcoins to decrypt your files. Source: BleepingComputer Locky installed via a E-Mail attachment: Locky is currently being distributed via email that contains Word document attachments with malicious macros. The email message […]

WP to LinkedIn Auto Publish Powered By :