DMCA EXEMPTIONS LIFT HACKING RESTRICTIONS
White hat hackers can breathe a little easier for the next two years because of a temporary removal of restrictions imposed on hacking of everything from cars, medical devices, toRead More →
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.
White hat hackers can breathe a little easier for the next two years because of a temporary removal of restrictions imposed on hacking of everything from cars, medical devices, toRead More →
A number of computers at a five-star Geneva hotel that has hosted sensitive talks, including Iranian nuclear negotiations, were found to be infected with malware used for espionage, Swiss prosecutorsRead More →
A new set of official US Air Force photographs confirm the flying branch’s biggest spy planes are helping hunt Islamic State fighters. The missions come as Iraqi and Kurdish troopsRead More →
Cisco has emailed users of its mobile careers site, warning of two occasions when their data could have been exposed. Users of Cisco’s Professional Careers mobile site, mjobs.cisco.com, have beenRead More →
Your phone can talk to advertisers beyond your back, beyond your audible spectrum. Dystopian corporate surveillance threats today come at us from all directions. Companies offer “always-on” devices that listen for ourRead More →
UPDATE: As of late Wednesday night, William Hill’s websites remain offline. Sounding more than a little defeated, the company’s official Twitter feed could offer only the following: “We’re calling itRead More →
Citing a computer virus outbreak, a hospital system in the United Kingdom has canceled all planned operations and diverted major trauma cases to neighboring facilities. The incident came as U.K. leaders detailed a nationalRead More →
Communications failure leads to zero day, late patch, natch. Millions of do-it-yourself websites built with the Wix web maker were at risk of hijack thanks to a brief zero dayRead More →
The Linux Plumbers Conference’s internet has been slowed to a crawl. SANTA FE, NM — If you can’t reach your favorite Linux developer by IM or e-mail today, it’s becauseRead More →
Critical vulnerabilities in MySQL and vendor deployments by database servers MariaDB and PerconaDB have been identified that can lead to arbitrary code execution, root privilege escalation and server compromise. DawidRead More →
Our efforts to make the internet safer and protect our customers involves, amongst many other things, researching and identifying zero-day vulnerabilities in the third-party software. As part of our effortRead More →
Stealth Cell Tower, it is an antagonistic GSM base station concealed in an office printer that could be used for surveillance purposes. Are you angry with your boss or yourRead More →
Executive vice president of Microsoft’s Windows and Devices group revealed that Windows Kernel zero-day recently disclosed was used by the Fancy Bear APT. On Oct. 31, the Google Threat AnalysisRead More →
Security researchers warn that a bogus Flash Player app aimed at Android mobile devices has surfaced and is luring victims to download and install banking malware that steals credit card information andRead More →
The information about a 0-day SAP vulnerability was published on LinkedIn on October 28, 2016. A researcher disclosed details of the vulnerability in SAP system that he had identified andRead More →
When a site gets hacked, the attack doesn’t end with the malicious payload or spam content. Hackers know that most website administrators will clean up the infection and look noRead More →
Verint’s Cyber Research team has discovered an unknown variant of the Nymaim malware family, a group of threats that are also capable of downloading various malicious payloads onto the affected device,Read More →
Yet another privacy coalition is urging WhatsApp to clarify that user information shared between the company and Facebook is compliant with data protection laws on the books in Europe. The ArticleRead More →
A Windows zero-day vulnerability is being used in an unknown number of attacks, Google disclosed today, 10 days after it privately reported the issue to Microsoft. Google’s disclosure follows itsRead More →
Shadow Brokers identifies hundreds of organizations it claims were hacked by NSA. Shadow Brokers—the name used by a person or group that created seismic waves in August when it publishedRead More →