A hacker figured out how to brute force iPhone passcodes
The attack allows any would-be-hacker to run as many passcodes as they want, without destroying the data. A security researcher has figured out how to brute force a passcode onRead More →
The attack allows any would-be-hacker to run as many passcodes as they want, without destroying the data. A security researcher has figured out how to brute force a passcode onRead More →
Symantec, a software developer, claims to have discovered a cyber espionage campaign focused on infiltrating three telecom operators in Southeast Asia, as well as a defense contractor and a satelliteRead More →
Ticketfly, an online ticket sale service, has been targeted by a malicious agent and, as a result, user’s personal information was stolen, information security trainingspecialists from the International Institute ofRead More →
Thieves are using a new technique that involves manipulating font sizes to escape from Office security protocols, known as ZeroFont phishing, reports the International Institute of Cyber Security. According to specialists in informationRead More →
Reports from experts in information security training inform that a mining Trojan is being installed along with the popular Android operating system emulator “Andy”, and its users are actually concerned.Read More →
Information technology and information security training experts have found a strange and maybe dangerous flaw in the privacy of these devices that could filter their location to potential attackers. InRead More →
The MD Anderson Cancer Center has been cited for keeping their devices unencrypted. The lack of device encryption will cost a Texas-based cancer treatment center 4.3 million dollars by the DepartmentRead More →
Potential damage a company can suffer from information leaks has become a hard reality to face for Tesla‘s CEO, Elon Musk, who has expressed his disappointment at discovering that there isRead More →
Approximately 400 Axis Communications security cameras are affected by several vulnerabilities, including critical failures that can be chained to take full control of a device and access its stream.Read More →
An arbitrary file-overwrite vulnerability affects a large number of projects, researchers reveal. The flaw, known as Zip Slip by information security training experts that have analyzed it, has already been seenRead More →