A hospital suffers a ransomware infection
A mental health hospital for children and young people in Delaware, U.S., was infected with a ransomware variant at the end of last year. According to network security and ethicalRead More →
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.
A mental health hospital for children and young people in Delaware, U.S., was infected with a ransomware variant at the end of last year. According to network security and ethicalRead More →
WhatsApp have devised a new plan in the fight against the fake news spreading. According to network security and ethical hacking specialists from the International Institute of Cyber Security, theRead More →
The flaw is being exploited by at least two malicious actors; Users are encouraged to install updates as soon as they are. The most recent Microsoft weekly update package focusedRead More →
Experts explain why this combination of characters has been linked to multiple incidents of data breach According to network security and ethical hacking specialists from the International Institute of CyberRead More →
A protocol implementation error appears to be the cause of this flaw Network security and ethical hacking specialists recently published a report revealing technical details about a vulnerability that allowedRead More →
Experts demonstrated an attack technique to compromise a computer through hardware connections A team of researchers developed a Field-Programmable Gate Array (FPGA) to demonstrate an attack in which a hackerRead More →
Websites in Israel have been attacked by threat actors hoping to get cryptocurrency transactions A hacker or hacker group made a massive attack against multiple web pages in Israel, leavingRead More →
The flaw is present in all Intel generations after the first generation of Intel Core A speculative execution vulnerability (dubbed Spoiler) has been found in several generations of Intel CPUs,Read More →
The attacks began two days after the company corrected a critical vulnerability A critical vulnerability in various router models was recently solved by Cisco. However, according to network security andRead More →
An airline launched a challenge inviting participants to delete all their social network posts in exchange for the opportunity to win a year of free flights The JetBlue airline hasRead More →
This new version includes mainly hardware support improvements This new version includes mainly hardware support improvements Network security and ethical hacking specialists from the International Institute of Cyber Security reportRead More →
All users of this platform have been affected by this incident The videogame company Armor Games admitted that all of its users have been affected by a recent massive dataRead More →
Because of a configuration error in Amazon Web Services, the company exposed highly sensitive information According to network security and ethical hacking specialists from the International Institute of Cyber Security,Read More →
The launch has been designed to correct a critical vulnerability Ubuntu has just announced an unscheduled launch: updating its version 16.04 LTS, for its server and desktop products. According toRead More →
Graphics processor developers offer protection against vulnerabilities found on Windows and Linux systems Nvidia, a company specializing in the development of graphic processing units, has included an unusual feature inRead More →
Developers have published links for direct download on different operating systems Network security and ethical hacking experts from the International Institute of Cyber Security report the launching of Wireshark 3.0.0,Read More →
Some consider that the real goal behind the operators of this viral challenge is to collect sensitive details According to experts in network security from the International Institute of CyberRead More →
The Australian authorities maintain that Ward operated a sophisticated drug distribution network on dark web Australian authorities have seized a house on the beach, luxury cars and $100k USD dollarsRead More →
Police agencies found the hacker after he used the IP of his address to access his platforms According to network security and ethical hacking specialists from the International Institute ofRead More →
These malicious files allow victims’ data collection Network security and ethical hacking specialists from the International Institute of Cyber Security report the discovery of a malicious campaign that uses PDFRead More →