hacker Archive

Obama wants a programme to sanction hackers

A new program that allows the government to punish foreign hackers was urged by US President to be created. The government will now be able to target those attempting cyber attacks on US assets and infrastructure and sanction hackers. “Cyber-threats are one of the most serious economic and national security

How to know if you have been hacked

81% of large businesses have suffered malicious data breaches shows in a cybersecurity survey, made by UK Government’s in 2014. That indicate almost one in five didn’t. “In this context, it’s impractical to prove a negative,” said Lenny Zeltser, a senior faculty member at the SANS Institute, who

Attorney-Client Privilege – Under Cyber Attacks

Law firms are the perfect targets for hackers according security experts. “It is almost a daily occurrence that we read about cyber attacks in the news. Unfortunately, on or around January 25, 2015, our firm was the victim of a single cyber attack, by a relatively new variant

Gamers targeted by CryptoLocker, a ransomware virus

  I was telling some time ago about a type of virus, ransomware which basically encrypts your data and you can not regain access unless you pay an amount of money  as a reward. CryptoLocker has a new variant which targets gamers and stop them playing their favourite games unless they pay a

Can driverless cars be hacked ?

  Driverless cars could be vulnerable to hackers who could bring cities to a chaos, steal cars remotely or even commit deadly terror attacks, and many other problems, is a known fact. The report from the Institution of Engineering and Technology (IET) suggests that autonomous vehicles could be on the roads in

Dozens arrested in cybercrime raids

The UK’s National Crime Agency has arrested this week 56 suspected hackers as part of a “strike week” against cybercrime. In total, 25 separate operations were carried out across The United Kingdom. Those arrested are suspected of being involved in a wide variety of cybercrimes including data theft,

Tracking the FREAK ATACK, a huge SSL security flaw

  Called Freak, Factoring attack on RSA-EXPORT Keys, the security breach exists on high-profile websites. It is supossed that seven hours is all it takes to crack the encryption that is in place on some supposedly secure websites. Browsers can be hijacked and tricked into accessing websites using legacy encryption.  There was

Superfish: Lenovo is only the tip of the iceberg

  Security experts from G Data SecurityLabs analyzed Superfish adware. In this process, analysts have encountered in program, a technology component,  called SSL digestion. It uses a root certificate which is poorly secured and has extensive rights on the computer. SSL Digestor intercept safe HTTPS connections which can be decrypted.

Federal Communications Commission approve net neutrality rules

  The Federal Communications Commission on Thursday voted to approve new rules on how the internet should be governed. New rules will prohibit internet service providers from discriminating against content producers. “Who determines how you use the internet? Who decides what content you can view and when? Should there

Android phones can be tracked just with battery power alone

  We all know that a phone uses more power the further away it is from a cell tower as it tries to connect. So, an Android phone can be tracked by studying their power use over time, without using their GPS or wi-fi/data usage. Extra power is used by