Dark Web, where your entire identity is for sale
Your Entire Identity Is Up for Sale at the Dark Web. Having multiple accounts online is a common practice as we use all sorts of services from carrying out transactionsRead More →
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.
Your Entire Identity Is Up for Sale at the Dark Web. Having multiple accounts online is a common practice as we use all sorts of services from carrying out transactionsRead More →
N.Y. hospital suffered a data breach affecting about 135,000 patients when an unauthorized party gained access to its servers, according to information security training researchers. St. Peter’s Surgery & EndoscopyRead More →
The Chinese cryptocurrency exchange Binance is offering $250,000 in Binance Coin (BNB) to anyone who can provide conclusive evidence against hackers and lead to prosecution and jail for attempting toRead More →
The spike in Bitcoin value prompted cybercriminals to focus on cryptocurrency hijacking through a variety of methods, including malicious Android apps. During Q4 2017, information security professionals saw on averageRead More →
How DUMB works Dumb works with a masked dumain for substitution. The dumain can have as many masks as you want as long as you pass the according wordlists, explain informationRead More →
According to an information security firm, China is attempting to cover up inexplicable delays in public reporting of high-risk software security holes by changing the dates of vulnerability publication toRead More →
Researchers found they were able to infect robots with ransomware; in the real world such attacks could be highly damaging to businesses if robotic security isn’t addressed. According to information securityRead More →
Apple is once again present for non-positive issues. Recently there were articles where companies claimed to have managed to find a way to unlock any iPhone. Today news report thatRead More →
The vulnerability in Memcached Servers has been exposed to the masses since its proof of concept (PoC) code was recently published online. That exposure would now allow script kiddies toRead More →
Hackers hit over 1,400 Apache Solr servers at the end of February to install a cryptocurrency miner. According to information security training researcher Renato Marinho, the Apache Solr attackers are using theRead More →
Thanks to Microsoft who a few months ago vowed to bring open source software to its store, now you can download Kali Linux and install it on Windows 10 KaliRead More →
The widely distributed Gozi ISFB banking Trojan has a new trick up its sleeve; it has been making use of the evasive Dark Cloud botnet for distribution in a seriesRead More →
The Memcached vulnerability has been used in record-breaking DDoS attacks. Various proof-of-concept scripts have been released to exploit the vulnerability. Hackers have recently been exploiting a vulnerability in the MemcachedRead More →
As per ongoing investigation of an information security training firm, a stolen external hard drive has led to the personal information of more than 15,000 people formerly and currently associated with CaliforniaRead More →
Mac users are often told that they don’t need antivirus software, because there are no Mac viruses. However, this is not true at all, as Macs actually are affected byRead More →
Researchers find 150 Ramnit-infected apps a year after a similar batch was discovered. Last year, researchers discovered 132 Android apps in the Google Play market that lamely attempted to infect users with… WindowsRead More →
A loophole in Facebook’s advertising targeting mechanism could have let attackers obtain users’ phone numbers after they visited websites the attackers controlled, a group of information security training professionals revealedRead More →
A previously undisclosed vulnerability in Nike’s website allowed anyone with a few lines of code to read server data like passwords, which could have provided greater access to the company’sRead More →
This days Cortana seems to be the perfect AI assistant, but according to the discoveries of Israeli information security researchers Tal Be’ery and Amichai Shulman, Cortana is far from perfectionRead More →
The number of Flash Player exploits has recently declined, due to Adobe’s introduction of various measures to strengthen Flash’s security. Occasionally, however, an exploit still arises. On January 31, Kr-Cert reported aRead More →