The Dark Side of the Moonz

By Goyo Ambrosio | From computer forensics to cybersecurity through hacking and others.

60 Million Android Users Hit By Cryptocurrency Miner

Malvertising is a problem. Cryptocurrency-mining malware is a problem. Put them together, and you’ve got a really, really big problem.<p>A new …

Government websites hit by cryptocurrency mining malware

Thousands of websites, including those belonging to NHS services, the Student Loans Company and several English councils, have been infected by malware that forces visitors’ computers to mine cryptocurrency while using the site.<p>Late on Sunday, the website of the UK’s data protection watchdog, the …

Spyware. HackingTeam

Contents<p><i>This article is based on technical data from Kaspersky Lab experts and their analysis of the Korablin and Morcut malicious programs. A number</i> …

Hacking Team Leak Shows How Secretive Zero-Day Exploit Sales Work

The underground market for zero-day exploit sales has long been a hidden dark alley to anyone but the hackers and sellers who call it home. But the …

Endpoint Protection Platforms

Choose enterprise IT software and services with confidence. Read verified reviews from a list of the best reviewed Endpoint Protection Platforms of …

Gartner Inc.

Home - The Wassenaar Arrangement

Introduction<p>The Wassenaar Arrangement (WA) has been established in order to contribute to regional and international security and stability, by …

Transparency

Best encrypted messaging apps 2018 for Android

1. Signal<p>2. Telegram<p>3. WhatsApp<p>4. Silence<p>5. Facebook Messenger<p><b>Read on for our detailed analysis of each app</b><p>The proliferation of messaging apps across …

Apps

Mapping Hacking Team’s “Untraceable” Spyware

The second in a series of posts that focus on the global proliferation and use of Hacking Team RCS spyware, which is sold exclusively to governments.

Going Dark: Encryption, Technology, and the Balances Between Public Safety and Privacy

Joint Statement by Director James B. Comey and Deputy Attorney General Sally Quillian Yates Before the Senate Judiciary Committee

Surveillance

Top Five Digital Forensics Tools - Digital Forensics Global Recruitment

At Digital Forensics Global Recruitment, we pride ourselves on taking a thoroughly professional approach to our business, using our industry …

Open-source code from Mars rover used in espionage campaign targeting Indian government

Two open-source code libraries used in the development of the historic Mars rover have been exploited by cybercriminals and moulded into an effective …

Vault 7 Leaks : CIA Malware "OutlawCountry" Controls Linux Machine and Redirect the Victims Traffic into CIA Controlled Machine - WikiLeaks

WikiLeaks Revealed another Secret Document of CIA Malware called “<b>OutlawCountry</b>” that targets Linux Running Machines which Control and Redirect all …

Serious privilege escalation bug in Unix OSes imperils servers everywhere

“Stack Clash” poses threat to Linux, FreeBSD, OpenBSD, and other OSes.<p>A raft of Unix-based operating systems—including Linux, OpenBSD, and …

Information Security

Advanced CIA firmware has been infecting Wi-Fi routers for years

Latest Vault7 release exposes network-spying operation CIA kept secret since 2007.<p>Home routers from 10 manufacturers, including Linksys, DLink, and …

Cherry Blossom

The FBI Used a 'Non-Public' Vulnerability to Hack Suspects on Tor

If the vulnerability was a so-called zero day, that would bring up all sorts of disclosure issues for the FBI.<p>When the FBI hacked thousands of computers related to a child porn investigation in 2015, the agency took advantage of a "non-publicly-known vulnerability," according to a judge in a …

Hacked in Space: Are Satellites the Next Cybersecurity Battleground?

So many of the mundane, earthly things we rely on, from GPS to making a credit card transaction, are made possible by satellites orbiting beyond that blue sky, thousands of miles outside of Earth.<p>Space may feel like an untouchable realm, but as the systems we have in place get older, they're …

New Malware 'Rover' Targets Indian Ambassador to Afghanistan

On December 24, 2015, Unit 42 identified a targeted attack, delivered via email, on a high profile Indian diplomat, an Ambassador to Afghanistan. The …

Cybersecurity

Concepts and Methodology in Mobile Devices Digital Forensics Education and Training

One of draft versios of "Concepts and Methodology in Mobile Devices Digital Forensics Education and Training",<p>Abstract - This paper presents various issues in digital forensics of mobile devices and how to address these issues in the related education and training process. Mobile devices forensics …

Mobile Devices

With Sqreen, web developers can seamlessly find and avoid security threats

French startup Sqreen wants you to rethink how you deal with security for your web-based apps. With little effort, Sqreen can inspect, track and fix security holes, acting like a shield. You won’t have to change your workflow as Sqreen plugs to your existing app.<p>The startup just raised $2.3 million …

FBI says car hacking is a real risk

If you're not already worried about your car being hacked, you really should be, the US government says.<p>Connected cars are becoming "increasingly vulnerable" to cyberattack, according to an advisory issued Thursday by the FBI and the US National Highway Traffic Safety Administration.<p>They are just …

Apple gets three extra days to decide if it will hack the iPhone for the FBI

Apple has a little more time to respond to the historic order to break security protections on a phone belonging to one of the alleged perpetrators of the San Bernardino attack. When the order was initially handed down Tuesday night, the company was given five days to respond as to whether the …

Tim Cook

A Hollywood hospital is being held to ransom by hackers

The Hollywood Presbyterian Medical Centre has been hit by "ransomware" — a kind of malware that encrypts the victims' data, making it useless unless they pay a fine.<p>Its computer systems have been useless for more than a week, NBC Los Angeles reports. Documents and medical records have to be written …

Computer Systems

Is Cybercrime Just a Cost of Doing Business?

Is cybercrime, once an annoyance, now an ever-present threat, next just a cost of doing business?<p>The evolution of malicious code, attacker …

Cops Say They Can Access Encrypted Emails on So-Called PGP BlackBerrys

Dutch police say they are able to read encrypted messages sent on the custom, security-focused BlackBerry devices.<p>Dutch investigators have confirmed to Motherboard that they are able to read encrypted messages sent on PGP BlackBerry phones—custom, security-focused BlackBerry devices that come …

Privacy

The 7 scariest gadgets the NSA uses to spy on cellphones

Yesterday, <i>The</i> <i>Intercept</i> published an extensive catalog detailing the innumerable gadgets and technologies used by the military, law enforcement …