NSA may use ‘traffic shaping’ to snoop on US citizens

A few leaks show the National Security Agency is able to redirect a part of a country’s traffic to a friendlier site, where it...

Gandi is under attack, hundreds of domain addresses hijacked

Gandi, a domain name registrar and cloud hosting company, admitted over 750 web addresses stolen. On July 7, an unidentified attacker obtained the company’s login,...

9 years of jail time awaiting a Russian-born American citizen

Originally born in Russia, a 29-year-old man residing in Los Angeles, California, gets over nine years in jail. Alexander Tverdokhlebov has been sentenced for...

Two major vulnerabilities found in Windows NTLM protocol

This month, Microsoft released security patches, covering a number of critical flaws. Those include a privilege escalation vulnerability threatening all versions of Windows OS. Specialists...

A blunder in .io zone: everyone could have taken it over

It was the evening of July 7 when security researcher Matthew Bryant noticed that the domains ns-a1.io, ns-a2.io, ns-a3.io, and ns-a4.io were not reserved....

Adwind on the rise, spreading malware through spam emails

A recent research shows that Adwind is back. The cross-platform Remote Access Trojan is known by multiple names, including AlienSpy, jFrutas, Frutas, Unrecom, JSocket, Sockrat,...

Satellite phone encrypted communications can be cracked in real time

Conducted by Chinese security specialists, a new security research has shown there is another way to decrypt satellite phone calls, initially encrypted using the...

Hackers phish and water-hole US nuclear power plants

Since May 2017, hackers have been infiltrating into the corporate networks of nuclear power plants and the companies manufacturing facilities for them. While some credentials...

UK judge sent rulings from personal email, got complained about

While judicial use of IT is strictly regulated, and sending emails from official accounts is only prescribed, an unnamed British judge has used personal...

Wikileaks revealed BothanSpy & Gyrfalcon, alleged CIA’s SSH credential thieves

On Thursday, July 6, Wikileaks released documents on two projects, BothanSpy and Gyrfalcon, linking both to the CIA. The batch, named BothanSpy after the...

A recently detected bug triggers unusual behaviour in systemd

A bug found in systemd has caught a lot of attention within the past few days. As it has become known, an invalid username...

AlphaBay down, users suspect scam

AlphaBay, known as one of the largest dark web markets and dubbed the New Silk Road, has been offline since Wednesday. Users see the...

A number of critical flaws poke holes in Cisco’s security

As Cisco’s weekly security update list shows, there are some major vulnerabilities. Greatly affecting both the Elastic Services Controller and the Ultra Services Framework,...

NotPetya’s creators prove they can unscramble a file

Journalists of Motherboard have contacted the hackers linked to the new variety of Petya, often referred to as NotPetya. An encrypted file sent to...

Experts neutralized another malware attack in Ukraine

In cooperation with the Security Service of Ukraine (SBU), Ukrainian cyber police have stopped the second wave of Petya cyber-attack. Arsen Avakov, Interior Minister of...