A large chunk of the hijacked traffic passed through the network of a controversial Chinese state-owned telecom provider that was previously accused of intentionally misdirecting internet traffic. A tiny Nigerian ISP has hijacked internet traffic meant for Google’s data centers. The incident, called a BGP hijack, occurred yesterday, on November 12, between 13:12 and 14:35,… Read More


Britain’s biggest employer organisation and main trade union body have sounded the alarm over the prospect of British companies implanting staff with microchips to improve security. UK firm BioTeq, which offers the implants to businesses and individuals, has already fitted 150 implants in the UK. The tiny chips, implanted in the flesh between the thumb… Read More


The recent low in cryptocurrency morale has given our community a rich opportunity for reflection. The vast majority of us crypto enthusiasts have a genuine heart for marrying technology and social action, and I believe it’s time we reflect on where we wanted to go with digital currencies, honestly take stock of the state of… Read More


VirtualBox E1000 Guest-to-Host Escape. Contribute to MorteNoir1/virtualbox_e1000_0day development by creating an account on GitHub. Vulnerable software: VirtualBox 5.2.20 and prior versions. Host OS: any, the bug is in a shared code base. VM configuration: default (the only requirement is that a network card is Intel PRO/1000 MT Desktop (82540EM) and a mode is NAT). Until… Read More


A widespread scam pretending to be from ElonMusk and utilizing a stream of hacked Twitter accounts andfake giveaway sites has earned scammers over 28 bitcoins or approximately $180,000 in a single day. This scam is being pulled off by attackers hacking into verified Twitter accounts and then changing the profile name to ‘Elon Musk’. They… Read More


Despite the high quality of supportive tools in the field of security testing, this is still unknown territory for many development projects and therefore still has some unused potential. Christian Schneider’s session at DevOpsCon 2017 offers a well-rounded overview of the open-source tools used by security professionals and penetration testers in their daily work on… Read More


What are the flaws inherent in both Proof-of-Work and Proof-of-Stake that make Proof-of-Signature an ideal alternative? A short explanation is given below. How does Bitcoin validate transactions and deter denial of service attacks? It requires a transaction-requesting entity to perform computational work. Inessence, it makes data creation difficult for users but data verification easy for… Read More


A Chinese state-owned telecommunications company has been ‘hijacking the vital internet backbone of western countries,’ according to an academic paper published this week by researchers from the US Naval War College and Tel Aviv University. The culprit is China Telecom, the country’s third-largest telco and internet service provider (ISP), which has had a presence inside… Read More


Walking around downtown Orlando, you might not notice the lightbulb-sized camera affixed to one of the traffic signal poles along the city’s palm tree–studded avenues. But it’s there, scanning all the same. If it sees you, the camera will instantly send a live video feed over to Amazon’s facial “Rekognition” system, cross-referencing your face against… Read More