According to a group of researchers from the University of Trier two critical flaw affects the oAuth 2.0 authentication protocol. The OAuth 2.0 authentication protocol is widely used on social networking sites, every day billion of users access their profiles on Facebook and Google+ using it. According to researchers Daniel Fett, Ralf Küsters and Guido […]

A group of researchers from Vectra Threat Labs explained how to exploit IoT devices like 30$ D-Link DCS web cameras as a backdoor. Vectra Threat Labs, part of Vectra Networks has invested time testing some IoT solutions available in the market, and one of the most interesting products its always the Wi-Fi security web cameras. […]

Mike Hearn explains that the fundamentals are broken and the price the long term trend should probably be downwards. Mike Hearn, a senior Bitcoin developer explained the failure of the Bitcoin cryptocurrency as experiment and announced he has stopped working on it and sold his coins. Hearn blamed the community for the failure, according to the […]

At the recent ShmooCon conference a researcher presented a LastPass phishing attack that could allow hackers to steal your password. We discussed several times the importance of password managers such as LastPass, but sometimes hackers could exploit them to launch their attacks. The security researcher Sean Cassidy has presented on Saturday at the ShmooCon hacker conference […]

A new archive containing alleged voting records of millions of US citizens is available on a hidden service on the dark web. Joseph Fox from Motherboard discovered alleged voting records of millions of American citizens on a website in the dark web. The data were published on a website linked to a notorious cybercrime forum, […]

SplashData has published its fifth annual report on most used passwords in 2015, including the list of the Worst passwords of the year. For the fifth time, experts from the SplashData security firm have published a report, titled “Worst Passwords of 2015”  that analyzes the use of passwords in 2015. The researchers compiled the annual report with data […]

It is hard to believe but the RSA Conference registration page is collecting Twitter credentials sending them back to an RSA server, in-security by design! Security experts from Twitter recently made a singular discovery, the final step of the registration page on the RSA Conference website was requesting user’s Twitter credentials and sending them to the […]

Skype announced it will hide the user’s IP address, the new security feature is enabled by default in the latest update provided by the company. Skype now hides users’ IP addresses, a measure implemented to protect them against attacks from online trolls. Skype announced the security feature this week in a blog post, the feature is […]

Apple is not able to read messages sent between devices through iMessages but it is still able to access data in the backups. Let’s do a summary of previous events, following the Snowden‘ revelation of the global surveillance programs operated by the NSA the IT giants reacted defending their business and announcing the defense of the privacy of […]

Tails 2.0 is available for download, it implements new features, including security improvements. Speaking about privacy and operating system, we are obliged to mention the popular Debian-based distribution Tails “The Amnesiac Incognito Live System.” Now the version 2.0 is available online! Tails is a popular live operating system specifically designed to protect user privacy and […]

MasterCard announced the extension of the ‘pay-by-selfie’ facial recognition technology to 14 countries this summer, this means no more passwords. The giant multinational financial services corporation MasterCard announced the extension of the ‘pay-by-selfie’ facial recognition technology to 14 countries this summer. In October Mastercard announced the creation of a new payment method based on the Identity Check […]

The Electronic Frontier Foundation announced that the Let’s Encrypt Certificate Authority issued its millionth certificate. The open Certificate Authority (CA) Let’s Encrypt seems to be a success, the EFF is reaching its goals with the creation of this new certificate authority run by Internet Security Research Group (ISRG). IT giants like Mozilla, Cisco, Akamai, Automattic and […]

The Electronic Frontier Foundation announced that the Let’s Encrypt Certificate Authority issued its millionth certificate. The open Certificate Authority (CA) Let’s Encrypt seems to be a success, the EFF is reaching its goals with the creation of this new certificate authority run by Internet Security Research Group (ISRG). IT giants like Mozilla, Cisco, Akamai, Automattic and […]

A security researcher has devised a new technique to track users by analyzing the mouse movements, even when surfing on the Tor network. While we surf on the Internet we leave an impressive amount of traces that could be used to track our profile and also reveal our identity even we are visiting resources in the darknet. The […]

Fujitsu has announced plans to launch its digital payment system PalmSecure Technology in Europe that is a security solution for biometric identification Fujitsu has announced plans to launch its digital payment system PalmSecure in Europe that is a security solution for biometric identification, which is offering the perfect user authentication for payment scenarios. It operates touchless, highly […]

Fujitsu has announced plans to launch its digital payment system PalmSecure Technology in Europe that is a security solution for biometric identification Fujitsu has announced plans to launch its digital payment system PalmSecure in Europe that is a security solution for biometric identification, which is offering the perfect user authentication for payment scenarios. It operates touchless, highly […]

The Defense Advanced Research Projects Agency is calling for the development of a hacker-proof encryption App for the U.S. military. The US Defense Advanced Research Projects Agency (DARPA) is calling security experts to create a hacker-proof “messaging and transaction platform.” The project for a hacker-proof encryption App was proposed under the rules of the Small Business Technology Transfer […]

Developers often ignore that they are exposing sensitive data when they publish code containing their Slack access tokens on GitHub. It was the year 2015, the month of March when Slack officially posted the following statement on their corporate blog: “there was unauthorized access to a Slack database storing user profile information. We have since […]

The mystery about the identity of Satoshi Nakamoto, the founder of the Bitcoin currency scheme, seems to be resolved, the man is Craig Steven Wright. The mystery about the identity of Satoshi Nakamoto, the founder of the Bitcoin virtual currency scheme, seems to be resolved, the man is the Australian entrepreneur Craig Steven Wright. Craig Wright publicly […]

Google decided to switch on default HTTPS for its free domain service provider Blogspot, the migration will be easy and transparent for the users. After WordPress also Google decided to switch on default HTTPS for its free domain service provider Blogspot. The measure will impact millions of users of the popular platform. Since September 2015 Google had introduced […]

A study of online trackers carried out by researchers at Princeton University allowed the identification of the Audio fingerprinting tracking technique. Privacy is probably one of the most debated arguments when dealing with the Internet, we discussed several times the way to protect anonymity online and which are the attacks law enforcement and intelligence agencies carry on […]

The Tor Project released the Tor Browser 6.0, the last version of the popular Tor browser that brings along significant privacy and security improvements. Early this week the Tor Project released the new version of the Tor Browser, the Tor Browser 6.0 which is based on Firefox ESR 45. The new version of the popular […]

Compare and contrast WhatsApp and Telegram, so as to see which of the two messaging apps offers the best option for encrypted chat. Messaging apps have been increasing rapidly in popularity. WhatsApp has gone over one billion users and Telegram claims to have over 350,000 people a day signing up for its services. So, it […]

Cifas, a leading group in fraud protection, recently released its report on the fraud landscape for 2016 and the numbers are staggering. The first lesson taught to anyone working with classified data is that if someone can get all the little pieces of the picture, they’ll eventually have the whole picture.  Unfortunately, many users of […]

Google has launched a new Google API working together with Dashlane, to stop using passwords for Android users and improving the user experience. It is true that Android security apps work wonder and also Google has been trying to use fewer passwords or none whatsoever, making it harder for someone to penetrate the privacy of its users. […]

A few members of the community are calling for a ‘Tor general strike’ to protest against some decisions taken recently by the core members. Last month, the Tor Project announced that an internal investigation had confirmed the allegations of sexual misconduct against the notorious member Jacob Appelbaum. The allegations divided the internet privacy community, as a result of […]

From January 2017, Chrome will indicate connection security with an icon in the address bar labelling HTTP connections to sites as non-secure. Google continues its effort to make the web a better place by pushing the adoption of encryption, we left the IT giant in May when it announced the decision to switch on default HTTPS […]

Mozilla is at the point of banning Chinese certificate authority WoSign due to a number of severe violations that could impact Internet users. Mozilla is at the point of banning Chinese certificate authority WoSign due to a number of violations, including backdating SHA -1 certificates in order to subvert deprecating certs from being trusted. According […]

Unfortunately, many smartphones have never been designed with security in mind, which are the most secure smartphones? Enjoy it! In general, smartphones have never been designed with security in mind. The emphasis has always been on features and capabilities while security is usually relegated to the back burner. And, while no internet-connected device is 100% […]

Mozilla development team announced a new privacy protection mechanism that will come with Firefox 52, it aims to prevent websites from fingerprinting users. Mozilla announced the introduction of a new privacy protection mechanism to Firefox 52 that prevents websites from fingerprinting through system fonts. The technique is widely adopted by advertising companies via hidden scripts delivered with […]

The popular crypto-currency Bitcoin has jumped above the threshold of $1,000 for the first time since November 2013. Why? Did you invest in Bitcoin? Good news for you, the value of the crypto-currency has passed the threshold of $1,000 for the first time since November 2013. The digital currency peaked the value on 1 January and now […]

ZeroNet is a new and revolutionary decentralized P2P internet that promise to avoid censorship and improve user privacy on the open web. ZeroNet is a decentralized and open source web platform. It’s based on BitTorrent(p2p) technology and BitCoin cryptography. These features ensure a decentralized censorship-resistant network. The contents published by users can never be deleted […]

A security issue can be used to intercept and read encrypted messages. Is this a WhatsApp backdoor? Which are potential risks? Is the popular messaging service Whatsapp affected by a backdoor? According to a blog post published by The Guardian, the application was affected by a vulnerability that could be exploited by attackers to intercept and read messages. […]

The TorWorld initiative aims to build a community area for those people that desire to set up either a Tor Relay or a Tor Exit node. We all recognize the importance of the Tor network, an important instrument to protect users’ anonymity and avoid censorship. Today I desire to present you an interesting initiative launched by Tor […]

Given the high trust we have on Gmail we tend to believe that all messages that fall into our inbox are legit and safe, but there is something to know … 1.    Introduction Taking good care of e-mail messages is certainly among the first recommendations of any information security policy and user awareness program. The involved […]

HackerHouse researchers have discovered that media content protected by Digital Rights Management (DRM) can be used to uncloak Windows Tor Browser users. The anonymity of the Tor users is threatened by a new issue related the Microsoft’s DRM. Windows users running the Tor browser can be de-anonymized with a trick based on the Microsoft DRM (Digital Rights […]

Smart TV vendor Vizio makes the headlines because it has been caught while secretly collecting consumers’ data through over 11 Million devices. IoT devices are privileged vectors for surveillance activities, mobile devices, gaming console, smartphone and even smart TV could be used to spy on users. Now one of the world’s biggest smart TV makers […]

Smart TV vendor Vizio makes the headlines because it has been caught while secretly collecting consumers’ data through over 11 Million devices. IoT devices are privileged vectors for surveillance activities, mobile devices, gaming console, smartphone and even smart TV could be used to spy on users. Now one of the world’s biggest smart TV makers […]

The current digital era is filled with all sorts of cyber dangers. The following tools will help you remain safe by enhancing your online security and privacy. There are many software tools that can help you preserve and protect your privacy online. For your benefit, I’ve compiled a list of the top 5 software tools […]

German regulators have banned ‘My Friend Cayla,’ an internet-connected doll that can chat with our children, it can be abused for surveillance activities. German regulators have banned ‘My Friend Cayla,’ an internet-connected doll that can chat with our children. The authorities believe the device is a “spying device”. The Federal Network Agency is inviting parents to […]

The new UK Prisons and Courts Bill will let mobile networks to deploy IMSI catchers outside of prisons to snoop on mobile phone users. The Prisons and Courts Bill, introduced to Parliament last week, will let mobile networks to deploy IMSI catchers outside of prisons to snoop on mobile phone users. The IMSI catchers are surveillance equipment […]

Google has now announced that E2EMail is no more a Google product, instead, it has become a “fully community-driven open source project.â€� The End-to-End crypto library is a core component of several projects of the IT giant such as the E2EMail, a Chrome app that runs independent of the normal Gmail web interface and allows non-technical users to […]

Google has now announced that E2EMail is no more a Google product, instead, it has become a “fully community-driven open source project.â€� The End-to-End crypto library is a core component of several projects of the IT giant such as the E2EMail, a Chrome app that runs independent of the normal Gmail web interface and allows non-technical users to […]

Fappening 2.0, Nude pictures of several celebrities have been leaked online, including Rose McGowan, Amanda Seyfried and Jillian Murray. Here we are speaking again of Fappening, new nude pictures of celebrities have been leaked online. In 2014 for the first time, several lots of private photographs of celebrities were leaked online, the phenomenon was dubbed […]

A group of researchers has demonstrated that attackers can steal PINs and Passwords capturing data from smartphone sensors. Modern mobile devices are full of sensors (i.e. GPS, Camera, microphone, accelerometer, magnetometer, proximity, gyroscope, pedometer, and NFC) that could be exploited by hackers to gather data about owner’s activities? A group of researchers from Newcastle University demonstrated that […]

A security researcher presented a method to exfiltrate sensitive data from a laptop or a smartphone through built-in ambient light sensors. The security expert Lukasz Olejnik discovered that it is possible to steal sensitive data exploiting the ambient light sensors built-in many smartphones and laptops. The ambient light sensors are installed on electronic devices to […]

Here are the top four extensions for the Chrome browser to keep your online activity safe, secure and private. The recent global wave of cybercrimes, particularly via exploiting loopholes in many leading browsers, has put internet privacy and online security directly in the line of fire. Internet users, in general, are worried about securing their […]

Here are the top four extensions for the Chrome browser to keep your online activity safe, secure and private. The recent global wave of cybercrimes, particularly via exploiting loopholes in many leading browsers, has put internet privacy and online security directly in the line of fire. Internet users, in general, are worried about securing their […]

The monitoring group Turkey Blocks confirmed that Turkey banned Wikipedia because its content web content that represents a threat to national security. According to the telecommunications watchdog, Turkey has blocked the access to the online encyclopedia Wikipedia on Saturday, the Government has taken this decision citing a law that allows it to ban access to […]

The monitoring group Turkey Blocks confirmed that Turkey banned Wikipedia because its content web content that represents a threat to national security. According to the telecommunications watchdog, Turkey has blocked the access to the online encyclopedia Wikipedia on Saturday, the Government has taken this decision citing a law that allows it to ban access to […]

The monitoring group Turkey Blocks confirmed that Turkey banned Wikipedia because its content web content that represents a threat to national security. According to the telecommunications watchdog, Turkey has blocked the access to the online encyclopedia Wikipedia on Saturday, the Government has taken this decision citing a law that allows it to ban access to […]

A CIS study estimated number of Aadhaar numbers leaked through 4 gov portals could be around 135 million and 100M bank account numbers. The Aadhaar is the world’s largest biometric ID system, with over 1.123 billion enrolled members as of 28 February 2017. The role of the system is crucial for both authenticating and authorizing transactions and […]

ProtonMail announced ProtonVPN is now available to the general public. ProtonVPN is officially out of beta. You can now directly get ProtonVPN by visiting https://protonvpn.com After more than 1 year of development, and four months of beta testing by over 10’000 members of the ProtonMail community, we’re finally making ProtonVPN available to everyone. And we […]

ProtonMail announced ProtonVPN is now available to the general public. ProtonVPN is officially out of beta. You can now directly get ProtonVPN by visiting https://protonvpn.com After more than 1 year of development, and four months of beta testing by over 10’000 members of the ProtonMail community, we’re finally making ProtonVPN available to everyone. And we […]

The Wisconsin company Three Square Market (32M) is about to become the first in the U.S. to implant microchip to its voluntary employees. In April 2015, the security researcher Seth Wahl implanted an NFC Chip in his hand to bypass security scanners in a high-security environment and exploit Android mobile devices. Wahle used the NFC chip […]

The Adobe product security incident response team (PSIRT) accidentally published a private PGP key on its blog, once discovered the issue it quickly revoked it. On Friday, the Adobe PSIRT updated its Pretty Good Privacy (PGP) key and published the new public key on the blog post. The new key should have been valid until September […]

The popular instant messaging application WhatsApp has been widely blocked in mainland China by the Government broadening online censorship. Bad news for the Chinese users of the popular instant messaging app WhatsApp because the application has been widely blocked in mainland China by the Government. Users are not able to send text messages, photo and video sharing. It isn’t […]

Developer discovered that iOS apps can read metadata revealing users’ locations and much more, a serious threat to our privacy. The developer Felix Krause, founder of Fastlane.Tools, has discovered that iOS apps can access image metadata revealing users’ location history. Krause published a detailed analysis on the Open Radar community, he explained that the app just […]

Open Whisper Systems announced that it’s working on a new private contact discovery service for its popular communications app Signal. Signal is considered the most secure instant messaging app, searching for it on the Internet it is possible to read the Edward Snowden’ testimony: “Use anything by Open Whisper Systemsâ€� Snowden says. The Cryptographer and Professor […]

Credit agency Experian is using scare tactics to sell a service for tracking traded user data on the dark web, let’s give a close look at the user agreement In the dark web, it is quite easy to find a lot of identities of unaware individuals and any other data that could expose companies to frauds. […]

ProtonMail launched ProtonMail Contacts, the world’s first contact manager with both zero-access encryption and digital signature verification. ProtonMail is announcing today the launch of the world’s first encrypted contacts manager that also features digital signature verification. Starting immediately, the new contacts manager is available to all of ProtonMail’s 5 million users around the world. The development […]

A federal judge in the California court has ruled that cryptocurrency exchange portal Coinbase must hand over details of over 14,000 users to the US IRS. In November 2016, the US Internal Revenue Service (IRS) has filed a motion asking the US Federal Court of Northern California to force the US-based cryptocurrency exchange portal to […]

The German Government is preparing a law that will force hardware vendors to include a backdoor in their products and to allow its unit to hack back. The German Government is preparing a law that will force hardware vendors to include a backdoor in their products. The law aims to allow law enforcement agencies to […]

The Chinese authorities have sentenced a man to five-and-a-half years in prison for selling a VPN service without the authorization. China continues to intensify the monitoring of the cyberspace applying, the authorities always fight any services that could be used to bypass its censorship system known as the Great Firewall. The Great Firewall project already blocked access to […]

China’s largest social media network, WeChat, is set to become an official electronic ID system in the country, an ID pilot program was launched in Guangzhou’s Nansha District. WeChat  (‘Weixin’ in China) is China’s largest social media network, according to Tencent Holdings, the platform had 980 million monthly active users as of late September. A […]

According to Google software engineer Grzegorz Milka, less than 10 percent of its users have enabled two-factor authentication (2FA) for their accounts. The availability of billions of credentials in the criminal underground due to the numerous massive data breaches occurred in the last years makes it easy for crooks to take over users’ accounts. We always […]

According to Google software engineer Grzegorz Milka, less than 10 percent of its users have enabled two-factor authentication (2FA) for their accounts. The availability of billions of credentials in the criminal underground due to the numerous massive data breaches occurred in the last years makes it easy for crooks to take over users’ accounts. We always […]

Researchers from security firm CrowdStrike spotted a new Monero crypto-mining worm dubbed WannaMine that spreads leveraging the NSA-linked EternalBlue exploit. This morning I wrote about the Smominru botnet that used NSA exploit to infect more than 526,000 systems, and I explained that other threat actors are using similar techniques to mine cryptocurrency. This is the case of […]

Silicon Valley with its bright minds has come to a point where almost every day they collect information about individuals. Why are we all silent on the surveillance? NSA spying apart, what Facebook, Apple, and Google know about their usual users is quite overwhelming. Each of these major players is trying to find more about […]

Russian authorities have arrested some employees at the Russian Federation Nuclear Center facility because they are suspected for trying to using a supercomputer at the plant to mine Bitcoin. The peaks reached by the values of principal cryptocurrencies is attracting criminal organizations, the number of cyber-attacks against the sector continues to increase, and VXers are […]

Bitmessage developers have issued an emergency update for the PyBitmessage client that patches a critical remote code execution vulnerability that has been exploited in attacks. Bitmessage development team has rolled out an emergency patch to address a zero-day vulnerability in the PyBitmessage client for Bitmessage, which a Peer-to-Peer (P2P) communications protocol used to send encrypted […]

Thieves steal 600 powerful computers in a huge heist in Iceland with the intent to use them for mining Bitcoin. Cyber criminal organization continue to show a great interest in cryptocurrencies, the number of crimes against cryptocurrency industry is on the rise. News of the day is that crooks have stolen 600 powerful computers from data centers […]

Facebook has implemented HSTS preloading that instructs a browser to always use SSL/TLS to communicate with eligible websites. Facebook has upgraded its link security infrastructure to include HTTP Strict Transport Security (HSTS) preloading that instructs a browser to always use SSL/TLS to communicate with eligible websites. Facebook and Instagram links will automatically update from HTTP […]

Palo Alto Networks discovered a malware dubbed ComboJack that is able of detecting when users copy a cryptocurrency address and alter clipboards to steal cryptocurrencies and payments. Crooks continue to focus their interest in cryptocurrencies, security researchers at Palo Alto Networks have spotted a strain of malware dubbed ComboJack that is able of detecting when users […]

Palo Alto Networks discovered a malware dubbed ComboJack that is able of detecting when users copy a cryptocurrency address and alter clipboards to steal cryptocurrencies and payments. Crooks continue to focus their interest in cryptocurrencies, security researchers at Palo Alto Networks have spotted a strain of malware dubbed ComboJack that is able of detecting when users […]

Researchers from the ISC SANS group and the Anti-DDoS company Imperva discovered two distinct campaigns targeting Windows Server, Redis and Apache Solr servers online. Last week new mining campaigns targeted unpatched Windows Server, Apache Solr, and Redis servers, attackers attempted to install the cryptocurrency miner Coinminer. Two campaigns were spotted by researchers from the ISC SANS group and the […]

The website VPNMentor discovered that IP leak issues in three major VPN vendors, only Hotspot Shield VPN promptly fixed it. The website VPNMentor decided to hire a group of hackers to test popular virtual private networks (VPN) for vulnerabilities that can pose risk for the users. The results of the tests revealed that the solutions evaluated by the […]

The website VPNMentor discovered that IP leak issues in three major VPN vendors, only Hotspot Shield VPN promptly fixed it. The website VPNMentor decided to hire a group of hackers to test popular virtual private networks (VPN) for vulnerabilities that can pose risk for the users. The results of the tests revealed that the solutions evaluated by the […]

The macOS client for the Signal fails to properly delete disappearing messages from the recipient’s system, potentially exposing sensitive messages. Signal is considered the most secure instant messaging app, searching for it on the Internet it is possible to read the Edward Snowden’ testimony: “Use anything by Open Whisper Systems” Snowden says. The Cryptographer and Professor at Johns […]

An unknown hacker made over $18 Million worth of BTG (Bitcoin Gold) powering “double spend” attacks on the Bitcoin Gold cryptocurrency network. The attacks started on May 18, the attacker used a large number of servers that allowed him to take the control of the majority of the Bitcoin Gold’s network hashrate, an attack technique dubbed “51% […]

A flaw in T-Mobile’s website allowed anyone to access the personal account details of any customer by providing their mobile number. The bug discovered by the researcher Ryan Stevenson resides in the T-Mobile subdomain promotool.t-mobile.com used by the staff as a customer care portal to access the company’s internal tools. The promotool.t-mobile.com subdomain contained a hidden API that would […]

The Turkish Personal Data Protection Authority fined Facebook $270,000 for the Photo API bug that exposed personal photos of 300,000 Turkish users. The Turkish Personal Data Protection Authority (KVKK) has fined Facebook 1.65 million Turkish lira ($270,000) for the Photo API bug that exposed personal photos of 300,000 Turkish users. In December, Facebook announced that […]

Researchers discovered that recently patched Firefox zero-day (CVE-2019-11707) has been exploited to deliver Windows and Mac malware to cryptocurrency exchanges. Experts discovered that recently patched Firefox zero-day vulnerability (CVE-2019-11707) has been exploited by threat actors to deliver Windows and Mac malware to employees of cryptocurrency exchanges. CVE-2019-11707 is a type confusion vulnerability in Array.pop. Mozilla has addressed […]

5G technology is here, it is the right time to discuss security and privacy in smart cities and their possible evolution. After a long talk and eagerly waiting, finally, 5G technology is here. The 5G tech is fast – really fast, and now, ‘true’ smart cities are just about time to turn into reality. But […]

The popular ProtonMail end-to-end encrypted email service and ProtonVPN VPN service have been blocked by the Russian government this week. This week the Russian government has blocked the ProtonMail end-to-end encrypted email service and ProtonVPN VPN service. Roskomnadzor explained that the services were abused by cybercriminals and that Proton Technologies refused to register them with state authorities. The […]

Google and Apple recently announced a joint project for the development of a Coronavirus ‘contact tracing’ tool for mobile devices. A contact tracing app is a tool that could be used to contain new diseases, like Coronavirus, by tracking down and quarantining everyone that gets infected and localize any person that has been in contact […]

Tor Browser 9.5 includes important security updates to Firefox, users on desktop will be able to opt-in for using onion sites automatically whenever the website makes them available.  Starting with the release of Tor Browser 9.5, new features will make accessing onion addresses easier.  Now, there is also an opt-in mechanism available for websites that want Tor […]

The global data privacy landscape is changing and everyday we can see new regulations emerge. These regulations are encouraging organizations to be better custodians of the consumers data and create a healthier space for data privacy. In order to do so organizations will need to rework their operations and revamp their processes in order to […]

Yesterday almost $1 billion worth of cryptocurrency contained in a password-protected BitCoin wallet was moved to another wallet. Ahead of the 2020 Presidential election a mysterious transaction was noticed by cyber security experts and researchers. Someone has transferred almost $1 billion worth of cryptocurrency contained in a password-protected BitCoin wallet to another wallet. @viperaviola @arturodicorinto […]

The European Union is going to unveil two laws, the Digital Services and Digital Markets Acts, that will impose new rules for tech giants. The European Union is set to unveil two laws, the Digital Services and Digital Markets Acts, that aim at defining new rules for the digital market, especially for the operations of […]

Microsoft uncovered a malicious campaign targeting Kubeflow workloads to deploy TensorFlow pods that are used to mine cryptocurrency. Microsoft researchers uncovered a malicious campaign targeting Kubeflow workloads to deploy TensorFlow pods that are used to mine for cryptocurrency. The campaign was first spotted at the end of May, experts noticed the deployment of TensorFlow pods […]

A flaw in the Peloton Bike+ could be exploited by an attacker with initial physical access to gain root entry to the interactive tablet, taking complete control of the system. A vulnerability in the popular Peloton Bike+ could have allowed an attacker to gain complete control over the device, including the camera and microphone to […]