This article want to be a POC (Proof of Concept) about how an attacker with bad intention could use your pictures published into Social Networks to retrieve information about you.
Are you readyyyyy?? ...Here we goooo!!
In the last days I discovered a Web Site that works like an OCR, it can...
Wednesday, 18 January 2017
Monday, 17 October 2016
The Threat Behind an Italian Phishing Campaign

According to Wikipedia (https://en.wikipedia.org/wiki/Phishing) Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly,money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic...
Monday, 22 August 2016
Hackers Vs Hackers - Equation Group's Cyber Weapon Leaked

One week ago in Pastebin website, a new paste was posted, its title is "Equation Group - Cyber Weapons Auction".
This paste seems to be published by a group of hackers called Shadow Brokers. The group
claims to have attack tools and exploits which is probably attributable to hacker group...
Thursday, 21 July 2016
Monday, 18 July 2016
Pokemon GO evolves in Malware GO - Part 1

As reported from different fonts, Pokemon Go is a virtual reality game and it is also the first game developed by Nintendo for smartphone Android and iOS.
Researchers discovered an infected Android version of the mobile game Pokemon GO. The installation file (APK) was modified...
Subscribe to:
Posts (Atom)