New banking Scam: ATM HIJACKING
Cybercrime is always evolving to try to find the best way to get resources illegally. Specialists from IT security courses report a new variant of banking fraud in which, insteadRead More →
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.
Cybercrime is always evolving to try to find the best way to get resources illegally. Specialists from IT security courses report a new variant of banking fraud in which, insteadRead More →
Specialists from an information security training course report the finding of a critical vulnerability in version 5.2.1 of TinyMCE, the popular What-You-See-Is-What-You-Get (WYSIWYG) text editor for open source HTML thatRead More →
The development of a jailbreak for iOS systems has become one of the biggest ambitions of users of Apple devices. According to specialists in an ethical hacking course, Twitter userRead More →
The Android operating system has been characterized by its almost unlimited capacity for customization, in large part thanks to its Linux kernel and its open source nature, mention specialists inRead More →
Specialists from a pentesting course have revealed the finding of a critical flaw in PAN-OS, the operating system present in multiple Palo Alto Networks solutions. According to the report, theRead More →
Everyone agrees that spam is one of the most hated things by tech users. No matter how many times we empty the undesirable mail folder, it will be full againRead More →
Phone fraud has more and more variants and more complex resources, specialists from a cyber security consulting company report. A few days ago a reporter recounted how he contacted aRead More →
The Southeastern Philadelphia Transportation Authority (SEPTA) has confirmed the detection of a malware attack on its servers. According to pentesting course specialists, the incident has prevented SEPTA from sharing relevantRead More →
Security threats against telecommunication systems remain a serious problem, specialists in an exploit writing course say. Voice over LTE (VoLTE) packet-based telephony service, integrated into the Long Term Evolution (LTE)Read More →
Sometimes the most sophisticated technological developments depend on outdated technology, mention experts in a pentesting course. After a group of Pen Test Partners researchers analyzed an abandoned Boeing 747-400 aircraft,Read More →
More and more sites hosted in unconventional browsers are being forced to shut down, as mentioned by specialists in secure data destruction. Torum, a popular cybersecurity forum for users ofRead More →
A recently published report by specialists from an exploit development training points to the presence of multiple vulnerabilities in smartphones with Snapdragon processor installed. According to the reports, exploiting theseRead More →
The fingerprint scanner is one of the most common implementations on today’s smartphones, and it is becoming even more popular, exploit writing course specialists mentioned. Users consider this to beRead More →
Specialists in a network security course have reported the discovery of multiple vulnerabilities in Apache Server, the open source HTTP web server for UNIX, Microsoft Windows, among other platforms, developedRead More →
Reddit users were affected by a bizarre security incident over the weekend, mentioning experts from a pentesting course. More than 70 subreddits (name by which discussion forums on specific topicsRead More →
An unidentified threat player has leaked data from Transnational Bank in Kenya. The bank’s website has been out of service for at least a couple of days, hard drive destructionRead More →
A new security risk for TeamViewer users has been reported. Network security course specialists detail the finding of a critical vulnerability in the remote access platform that could allow threatRead More →
A new security feature for one of the most popular communication tools has arrived, as mentioned by iOS pentesting experts. As WhatsApp is one of the most popular instant messagingRead More →
Specialists in an exploit writing course report the discovery of three vulnerabilities in SQLite, the popular database management system. According to the report, the successful exploitation of these flaws wouldRead More →
Surveillance has become one of the leading practices of governments around the world, mentioning experts in a pentesting course. A few years ago, during a series of protests in NorthRead More →