Zephyr: The Linux operating system for IoT devices
Linux tries to address the need for an operating system of its own for IoT equipment Linux Foundation has just presented the so-called ‘Zephyr Project’, which consists of an operatingRead More →
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.
Linux tries to address the need for an operating system of its own for IoT equipment Linux Foundation has just presented the so-called ‘Zephyr Project’, which consists of an operatingRead More →
Hackers implant backdoors on ‘Infrastructure as a Service’ hardware servers Network security and ethical hacking specialists from the International Institute of Cyber Security report the finding of a new vulnerabilityRead More →
Vulnerabilities were patched months ago, although there are still exposed users Network security and ethical hacking specialists from the International Institute of Cyber Security report the finding of two criticalRead More →
This vulnerability can be exploited only by local attackers Malicious hackers could exploit a privilege escalation vulnerability in Cisco Webex Meetings for Windows operating systems to execute arbitrary commands usingRead More →
Two old vulnerabilities were exploited, allegedly by Chinese hackers The Cisco network security and ethical hacking teams recently detected intrusions from malicious hackers by targeting Elasticsearch clusters to exploit previouslyRead More →
Company officials report that unknown actors got access to data using credentials obtained in other incidents According to network security and ethical hacking specialists from the International Institute of CyberRead More →
Google experts consider these vulnerabilities to be inherent in modern processors design According to network security and ethical hacking specialists from the International Institute of Cyber Security, the vulnerabilities SpectreRead More →
Hackers accessed personal data from more than 160 million users According to network security and ethical hacking experts from the International Institute of Cyber Security, Dubsmash, the popular video app,Read More →
The Domain Name System is vulnerable to multiple cyberattacks, so the organization has requested to implement better security measures According to network security and ethical hacking experts from the InternationalRead More →
Some versions of the content management system present a critical vulnerability that leaves them exposed to remote code execution attacks Network security and ethical hacking specialists from the International InstituteRead More →
Multiple victims, mostly young people between the ages of 18 and 25, are invited to invest through an ad in the app; then the scammers disappear British authorities report anRead More →
In this phishing campaign the attackers are impersonating Google in attacks against banking institutions and their users Network security and ethical hacking specialists from the International Institute of Cyber SecurityRead More →
The vulnerability could have been used to extract messages from users and to inject malicious code their outgoing messages Network security and ethical hacking specialists from the International Institute ofRead More →
These new techniques allow the use of communication intercepting devices again During a recent event dedicated to network security experts, a team of researchers unveiled a set of vulnerabilities inRead More →
A tool available to any user OnionShare appeared in 2017 and, according to network security specialists from the International Institute of Cyber Security, allowed any user to share files inRead More →
cybersecurity #infosec #IIS #MicrosoftSystem administrators are recommended to update as soon as possible According to network security and ethical hacking specialists from the International Instiute of Cyber Security, the MicrosoftRead More →
The company failed to mention that its home security system has an integrated microphone Network security and ethical hacking specialists from the International Institute of Cyber Security report a newRead More →
Some users consider that these cameras can compromise their privacy Recently, a photograph showing a camera on one of the TV screens of a Singapore Airlines plane became viral, asRead More →
After discovering that the first correction could be bypassed, the company should launch a second Adobe Reader update patch According to network security and ethical hacking experts from the InternationalRead More →
A security flaw has been found in the biometric analysis function of the messaging service Network security and ethical hacking specialists from the International Institute of Cyber Security report theRead More →