Zero-Day, Angler kit exploits help drive up malvertising by 325%
A massive uptick in malvertising has taken place over the last few years and is becoming so popular that it may become the top technique used for drive by attacks,Read More →
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.
A massive uptick in malvertising has taken place over the last few years and is becoming so popular that it may become the top technique used for drive by attacks,Read More →
Reflective technique would let attacker amplify traffic and flood targets. BitTorrent has fixed a flaw in its technology that quietly turns file-sharing networks into weapons capable of blasting websites andRead More →
Hackers, months ago, revived macros as an attack vector to primarily hide banking malware spread by spam campaigns. Not be left out, some targeted attacks kicked off by convincing phishingRead More →
Major vulnerabilities have been detected in Dolphin and Mercury Android browsers that could have provided cybercriminals with the opportunity to launch zero-day attacks. This is considered to be a notableRead More →
Agora dark market suspends operations after finding “suspicious activity.” A dark market website that relies on the Tor privacy network to keep its operators anonymous is temporarily shutting down amidRead More →
Booming attack vector offers mass malware distribution, stealthy targeting. Feature Online advertising has become an increasingly potent threat to end-user security on the internet. More hackers than ever are targetingRead More →
Apple’s monster security update of Aug. 13 included a patch for an iOS vulnerability that could beacon out location data and other personal information from a device, even if aRead More →
Social engineering with very obvious assets blinds you to techno-toolkit. MILDLY NSFW A Chinese hardware hacker has hidden a penetration-testing toolkit into her high-heeled shoes. The Wi-Fi-popping platforms were forged inRead More →
Police suspect two suicides are related to the release of information stolen from the relationship-cheating website. Amid reports that the Ashley Madison security breach may have led to suicides andRead More →