IoT hack: how to break a smart home… again
There can never be too many IoT gadgets – that’s what people usually think when buying yet another connected device with advanced functionality. From our perspective, we also think there can’t beRead More →
Data Security News | Infosec Blog | Cyber Security Tutorials
There can never be too many IoT gadgets – that’s what people usually think when buying yet another connected device with advanced functionality. From our perspective, we also think there can’t beRead More →
Icebreaker Automates network attacks against Active Directory to deliver you plaintext credentials when you’re inside the network but outside of the Active Directory environment. Cyber security researchers explain that Icebreaker perform 5Read More →
More than 10,000 credit and debit card holders have been affected by a data breach reported by Punjab National Bank (PNB). Cyber security experts believe that the card details of customersRead More →
The Android spyware was used to steal personal data of victims – The campaign also shows why users should never use their real photos on Facebook. There are almostRead More →
Monitoring cell phones without their knowledge is growing rapidly in Latin America countries like Argentina, Mexico and Brazil after being very famous in US since 2008 The Stingray/ GSM interceptor/IMSIRead More →
Last week companies specialized in cyber security discovered the existence of a new Persistent Advanced Threat APT, supposedly sponsored by Dark Caracal, an organization dedicated to espionage. Since 2012, he has performedRead More →
This note will explore the life cycle of an attack, how a victim may be infected and what an attacker could do to avoid detection by antivirus systems (AV). GeneralRead More →
A technique widely used to avoid hacking a computer is to isolate it completely from the network, known as air-gapped. This technique was used to write the script of theRead More →
Some weeks ago I read about this Starbucks case where hackers hijacked laptops on the WiFi network to use the devices computing power to mine cryptocurrency, and I thought it might beRead More →
As the values of the largest cryptocurrencies have multiplied, so too have reports of digital-currency miners stealing resources to increase the profitability of their operations. Few weeks back, we reportedRead More →