We at Ghost Security Group™ deal with Islamic State hackers attempting to breach web sites on a daily basis, either… Read more UK’s National Cyber Security Centre Releases Top 100k Most-Used Passwords
The process of how a particular set of apps end up packaged together in the firmware of a device is not transparent, and various isolated cases reported over the last few years suggest that it lacks end-to-end control mechanisms to guarantee that shipped firmware is free from vulnerabilities or potentially malicious and unwanted apps.
On 24 Feb 2019, an individual uploaded a java-based emulator to javagamessite.com allowing the player to mow down people in… Read more ISIS Supporter Creates Java-based Game Emulating Vehicular Attacks in Major Cities
The Department’s cyberspace objectives are: 1. Ensuring the Joint Force can achieve its missions in a contested cyberspace environment; 2.… Read more U.S. DoD Releases Official 2018 Cyber Strategy
“Eight Bluetooth-related vulnerabilities (four that are critical) affecting over 5 billion Android, Windows and Linux devices could allow attackers to… Read more New airborne Bluetooth cyber threat, “BlueBorne,” that exposes almost every device to remote attack.
“Massive cyber attack targeting 99 countries causes sweeping havoc” http://money.cnn.com/2017/05/12/technology/ransomware-attack-nsa-microsoft/
“The 22-year-old man, known by the pseudonym MalwareTech, had taken a week off work, but decided to investigate the ransomware… Read more Global cyber-attack: Security blogger halts ransomware ‘by accident’
“Samata Ullah, 34, of Cardiff, admitted being a member of so-called Islamic State, as well as terrorist training, preparing terrorist… Read more ‘Cufflink terrorist’ Samata Ullah jailed for eight years
The National Investigation Agency (NIA) has obtained what it calls a “kill list” prepared by handlers of the Islamic State… Read more NIA probes Islamic State ‘kill-list’ of I-T engineers who tracked group online, 70 from Mumbai