PNG pongs: critical bug patched in ubiquitous libpng
Crafted image crashes apps, server processes. This will not be fun: the graphics processing library libpng has a vulnerability and needs to be patched. The problem for that is thatRead More →
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.
Crafted image crashes apps, server processes. This will not be fun: the graphics processing library libpng has a vulnerability and needs to be patched. The problem for that is thatRead More →
It didn’t take long for Anonymous members to rally and swear payback for the recent ISIS terror attacks that took place in Paris, France, on Friday, November 13, 2015. HavingRead More →
Hackers leak data of over 7,000 officers. Hackers who declined to name themselves hacked the servers of the Brazilian Army, and later leaked the personal details of around 7,000 officers. TheRead More →
Distributed via Word files and the Angler EK. Cyber-crooks are diversifying their activities by including as many threats as possible inside their malware-delivery campaigns. One such example is a campaign detectedRead More →
CSI: Cyber is known more for absurd drama than technical coherence, but it’s a big deal that hacking’s become so visible that it’s the plot point of a network TVRead More →
Point of sale malware has gotten more sophisticated as we inch closer to the two-year anniversary of the Target data breach. Now, two weeks from the biggest shopping day ofRead More →
Don’t hang up on your call just yet but some Samsung Galaxy Phones — the S6, S6 Edge and Note 4, in particular — have a demonstrated vulnerability that connectsRead More →
Vulnerabilities in SAP and Oracle products expose companies to crippling attacks, oil market fraud or equipment sabotage. A talk delivered at the Black Hat Europe 2015 security conference in Amsterdam showsRead More →
Avast confirms the recent Vizio Smart TV snooping scandal Security researchers at Avast have hacked a Vizio smart TV and gained access to the WiFi network the device connects to,Read More →
Google’s Chrome staff got in contact with the security researcher and has already started working on a fix A Chinese security researcher has found a security vulnerability in Google’s ChromeRead More →
FEDERAL AUTHORITIES HAVE indicted four men on charges that they hacked into multiple financial institutions and operated a stock-pumping scheme and online gambling operations that netted them more than 100Read More →
More than a year ago, the Tor Project patched its software against a vulnerability being exploited by researchers at Carnegie Mellon University, it said, for the purpose of de-anonymizing usersRead More →
One of the Internet’s oldest and crudest attacks experiences a resurgence. A number of sites have been hit by distributed denial-of-service attacks over the past week. Strong enough to knockRead More →
Over the weekend, a reader (@flanvel) directed Salted Hashto a post on a Dark Web marketplace selling a number of questionable, if not outright illegal goods. The post in questionRead More →
This remote access trojan (RAT) has capabilities ranging from manipulating the registry to opening a reverse shell. From stealing credentials stored in browsers to accessing the victims webcam. Through theRead More →
A hacker going by the handle of His Royal Gingerness (HRG) hacked into the official website of Norwich International Airport last month after sending several warning emails to the airportRead More →
Critical business applications such as SAP and Oracle ERP products process and store the Fortune 2000’s most critical data, yet spur relatively little concern when it comes to security vulnerabilities.Read More →
All Ubuntu users are urged to update as soon as possible. Canonical has just published four Ubuntu Security Notices that detail a recent Linux kernel vulnerability discovered in the kernel packagesRead More →
CYBERTHIEVES hacked into the parliament’s secure computer network and used sensitive files to hold an MP to ransom, it has been revealed. Cybercrooks hacked into parliament’s secure network and compromiseRead More →
Report: Germany, France, Japan contract hopefuls spotted multiple attacks. Hacking attempts are forcing bidders in Germany, France, and Japan for Australia’s A$50 billion submarine contract to rely on hand-delivery forRead More →