Multi-stage exploit installing trojan
ESET researchers receive and analyze thousands of new malware samples every day. Earlier this year, one of them caught our attention because it was not an ordinary executable file, butRead More →
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.
ESET researchers receive and analyze thousands of new malware samples every day. Earlier this year, one of them caught our attention because it was not an ordinary executable file, butRead More →
Google began to implement SSL on its search engine back in 2010. First on its own domain name, then as a mandatory feature for logged in Google users, andRead More →
Have you ever shared links to Google Search results before? If you have, you may have noticed that the url pointing to the search results page contains several other parametersRead More →
A challenge has been made against one of the conclusions in a potentially blockbuster academic paper on cryptographic weaknesses that may be the open door through which intelligence agencies areRead More →
A Jaguar XFR may have been stolen using hacking techniques increasingly seen on keyless cars. This unidentified thief did not have the key, which was locked safely away inside theRead More →
“We’re about to leave a whole chunk of the internet in the past,” as millions of people remain dependent on old, insecure, but widely-used encryption. In 2016, tens of millionsRead More →
Unlike other body parts, heart tissues are incapable of seal-healing once damaged. Fortunately, the scientific community continue to hack modern technology into solving life’s most complex health problems. Conventional 3DRead More →
TalkTalk, a British phone and broadband provider with more than four million customers, disclosed Friday that intruders had hacked its Web site and may have stolen personal and financial data.Read More →
The fear of malicious actors taking control of glaring flaws in smart cars is on the rise. This threat is therefore considered to be one of the major technical challengesRead More →
Researchers have found out that hackers took over around 900 CCTV cameras with weak login credentials and used them as a DDosS botnet that runs all around the world. AccordingRead More →