Top cyber security news|29 May 19
We talk about zero day vulnerabilities in Windows, Win10 restart issues, Huawei without android but new OS, Android Tor browser & Google Gsuit password. Below are the links of theRead More →
Information security specialist, currently working as risk infrastructure specialist & investigator.
15 years of experience in risk and control process, security audit support, business continuity design and support, workgroup management and information security standards.
We talk about zero day vulnerabilities in Windows, Win10 restart issues, Huawei without android but new OS, Android Tor browser & Google Gsuit password. Below are the links of theRead More →
We’re talking about unhackable devices: Morpheus processor, USB EyeDisk and Google Titan key. Arrested “The H-1” bank hackers in Mexico and Microsoft with updates. Below are the links of theRead More →
Here we talk about cyber attacks to Antivirus Companies, WhatsApp and Samsung, backdoor vs Microsoft Exchange and the identity of Satoshi Nakamoto is still hidden. Below are the links ofRead More →
Here we are talking about new cyber attacks against Github, YouTube and the Bitcoin Binance wallet, new Linux kernel and Israel strikes Hamas cyber operations center. Below are the linksRead More →
Web application security testing experts report that sites running Drupal, Joomla or TYPO3 are exposed to multiple variants of cyberattacks due to a vulnerability that hackers might exploit to run malicious code;Read More →
Amazon, the e-commerce and technology company, has suffered a cyber attack in which hackers compromised more than a hundred vendors’ accounts, stealing their funds through various scam tactics, as reportedRead More →
According to police reports, the 21 year old earned over $200k USD by selling the stolen accounts A 21-year-old Australian youth was arrested after generating more than $200k USD inRead More →
This advertising software is located in 210 Android apps available in the official Google Play store A figure close to 150 million of Android device users could have downloaded andRead More →
Three companies in the videogame industry established in Asian countries have been affected by this attack campaign According to experts in network security and ethical hacking from the International Institute of CyberRead More →
The service is free and has secure encryption Mozilla recently announced the launch of Firefox Send, a free-use service to send and receive files on an encrypted platform, report network security and ethicalRead More →
Microsoft has not released update patches for this bug Network security and ethical hacking specialists from the International Institute of Cyber Security report the emergence of a new vulnerability in Microsoft Word.Read More →
The code of this malware has existed for more than a decade, although there is always a malicious actor willing to update it Network security and ethical hacking specialists from theRead More →
The flaw could have been exploited to obtain random images stored on a user’s device According to network security experts from the International Institute of Cyber Security, an ethical hacker received aRead More →
Experts demonstrated the ease with which these devices can be unlocked by any user The biometric block screen based on face recognition of the Samsung Galaxy S10 can be compromised in aRead More →
A group of, allegedly Iranian, hackers stole around 6 TB of confidential information According to network security and ethical hacking specialists from the International Institute of Cyber Security, Citrix, the enterprise management softwareRead More →
It is still unknown how long the information remained exposed Network security and ethical hacking specialists from the International Institute of Cyber Security reported a massive data leaking from multiple onlineRead More →
Local government officials had to pay almost half a million dollars to regain access to their systems According to network security and ethical hacking specialists from the International Institute of Cyber Security, ransomware infectionsRead More →
The applicants’ files of three prestigious universities would have been compromised by malicious actors The process of appliance to a university can be complicated, even more in a context whereRead More →
Gmail, from Google, is one of the main services that use this login method Network security and ethical hacking specialists from the International Institute of Cyber security ensure that malicious actorsRead More →