Malware Jumps from PC to PC via Cloud Sync Apps
4.1% of all sanctioned cloud apps are laced with malware. During the past month, cloud security analysts have seen more and more malware spreading from one PC to another in aRead More →
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.
4.1% of all sanctioned cloud apps are laced with malware. During the past month, cloud security analysts have seen more and more malware spreading from one PC to another in aRead More →
The journalist Steven Petrow had his computer hacked while on a plane, it was a shocking experience that raises the discussion on privacy. Experts in the aviation industry are spendingRead More →
Short Bytes: When you read the headlines like “FBI is forcing Apple to create a backdoor in their products”, what you are really reading is that the FBI is forcing iPhone-makerRead More →
‘Sybil’ nodes could be used to de-anonymise traffic. The Tor Project is working with Princeton University boffins to try and identify possibly malicious nodes, and prevent them from harvesting traffic byRead More →
Other than an Apple backdoor hack, FBI could use 3 other hacks on killer’s iPhone. According to hardware-security experts, there are at least three ways the FBI could try to removeRead More →
Most ISPs that engage in this practice are owned by two of Asia’s biggest network operators, both located in China. Three researchers from Israel have conducted a study on theRead More →
Infection forces patients onto phones and medicos onto faxes. At least two hospitals in Germany have come under attack from ransomware, according to local reports. The alarming incidents follow similarRead More →
All it takes to hack security cameras and bank accounts is an email, demonstrates a hacker. What happens when you challenge a series of extremely dexterous hackers to hack your bankRead More →
Apple has patched more than 60 vulnerabilities affecting the Apple TV, including flaws that can lead to arbitrary code execution and information disclosure. IoT devices are enlarging our attack surface,Read More →
Asus lied about its routers’ security, it delayed security patches for months, and now it’s paying the price. A few months back, the US Federal Trade Commission (FTC) filed a complaint againstRead More →
A judge has confirmed that US Departement of Defense funded the Carnegie Mellon University to conduct research on the Tor hacking. In November 2015, the researchers at the Tor Project publiclyRead More →
The security researcher Kafeine confirmed that the authors of the Angler EK have integrated the exploit for a recently patched Microsoft Silverlight vulnerability. Ransomware is becoming one of the most dreaded cyberRead More →
Survey, YouTube offer proof that people are blowing up ATMs to get the cash inside. What was the best way to steal cash from an ATM in 2015? Skimming stillRead More →
Journalist gets hacked while writing the FBI vs Apple iPhone hack story. The recent United States court’s order to Apple for hack San Bernardino shooter’s iPhone and providing a backdoor forRead More →
The security expert Troy Hunt discovered that it is possible to remotely control features of a Nissan Leaf via API. The popular security expert Troy Hunt discovered a security vulnerability affectingRead More →
Limited power to eavesdrop contrasts painfully with UK’s far-ranging Snooper’s Charter. German police are now permitted to infect a suspect’s computers, and mobile devices with special trojan software to monitorRead More →
Ricochet is the most secure encrypted anonymous messenger that sends no metadata. The security experts have approved a new internet messaging tool that bypasses the federal government’s metadata collection systemRead More →
Google and security firm Red Hat have discovered a critical security flaw in the Internet’s Domain Name System (DNS) that affects a library in a universally used protocol. This meansRead More →
Researchers blow the lid on one of the most dangerous and well-organized cyber-espionage groups around. Only after four different cyber-security firms teamed up, did security analysts manage to understand howRead More →
Over 4,000 branches and 13,000 ATMs were targeted through a massive phishing campaign. Customers of ICICI, India’s largest private bank, have become targets in a phishing campaign tailored to dupeRead More →