Wikileaks Reveals CIA Malware That Hacks & Spy on Linux

  • Juli 1st, 2017
  • admin

WikiLeaks has just published a new batch of the ongoing Vault 7 leak, this time detailing an alleged CIA project that allowed the agency to hack and remotely spy on computers running the Linux operating systems. Dubbed OutlawCountry, the project allows the CIA hackers to redirect all outbound network traffic on the targeted computer to […]

Pawn Storm Operation Against CDU

  • Mai 13th, 2016
  • admin

Source: Security Affairs Security experts follow a long time the operations of the Russian-linked Pawn Storm cyber spies, aka APT 28, Sednit, Sofacy, Fancy Bear and Tsar Team. In October 2014, security experts at Trend Micro spotted a cyber espionage operation targeting military, government and media agencies across the world. A new cyber espionage operation targeting military, government and media agencies […]

Surveillance – How to secretly track cellphone users position around the globe

  • April 18th, 2016
  • admin

Source: Security Affairs Using the proper surveillance systems available on the market it is easy and quick to track cellphone and the movements of targets everywhere on the globe. We recently discussed about the decision of Wikileaks to publish copies of the criticized surveillance software FinFisher, highlighting the dangers for the militarization of the cyberspace and […]

How To Hacking the Firm HackingTeam

  • April 18th, 2016
  • admin

Source: Security Affairs In July 2015, the surveillance firm Hacking Team suffered a serious security breach, unknown attackers have exfiltrated some 400Gbs of data (including emails, internal documents, and exploit source code), but since now no news regarding the attack was disclosed. Now the hacker using the online pseudonymous ‘PhineasFisher‘ published a detailed explanation of how he has hacked the Italian surveillance […]

The 7 Most Wanted Iranian Hackers

  • März 25th, 2016
  • admin

Source: The Hackers News The Federal Bureau of Investigation (FBI) has lengthened its Most Wanted List by adding seven Iranian hackers who are accused of attacking a range of US banks and a New York dam. On Thursday, the United States Department of Justice (DoJ) charged seven Iranian hackers with a slew of computer hacking […]

22.000 Jihadis are Disclosed

  • März 10th, 2016
  • admin

A former ISIS member has stolen and disclosed thousands of documents reporting the identity of 22,000 Jihadis and other important information. Thousands of documents reporting the identity of 22,000 Jihadis are handed to Sky News by a former member… Source: SecurityAffairs

A „New“ Ransomware In The Wild

  • Februar 20th, 2016
  • admin

Many security researcher and the German security agancy BSI identyfied a new ransomware named „Locky“. It encrypts your data using AES encryption and then demands .5 bitcoins to decrypt your files. Source: BleepingComputer Locky installed via a E-Mail attachment: Locky is currently being distributed via email that contains Word document attachments with malicious macros. The email message […]

A New Remote Access Trojan Explored – Trochilus

  • Januar 25th, 2016
  • admin

source: by: Pierluigi Paganini Researchers spotted a new espionage campaign relying on a number of RATs including the powerful Trochilus threat. Security experts have uncovered a new remote access Trojan (RAT) named Trochilus that is able to evade sandbox analysis. The Trochilus malware was used to targeted attacks in multi-pronged cyber espionage operations. Experts […]

RANSOM_CRYPTEAR – A New Crime Locker ?

  • Januar 16th, 2016
  • admin

Source: Hackinsight the very best Hacker Portal Faulty ransomware derived from an open source ransomware project makes files unrecoverable due to a serious coding error. The story I’m going to tell you is incredible, a cyber criminal gang has developed a very singular ransomware called RANSOM_CRYPTEAR.B and now I’ll tell you why? According to the experts […]

WP to LinkedIn Auto Publish Powered By :