Ambient Light Sensors Can Be Used to Steal Browser Data
Sensors used to detect the level of ambient light can be used to steal browser data, according to privacy expert Lukasz Olejnik. Over the past decade, ambient light sensors haveRead More →
Data Security News | Infosec Blog | Cyber Security Tutorials
Sensors used to detect the level of ambient light can be used to steal browser data, according to privacy expert Lukasz Olejnik. Over the past decade, ambient light sensors haveRead More →
The InterContinental Hotels Group (IHG) claims the implementation of its Secure Payment Solution (SPS) has helped to minimize a recent data breach that may have affected as many as 1,000Read More →
Someone has created a new Remote Access Trojan (RAT) that uses the Telegram protocol to steal user data from infected devices. The RAT is written in Python and is currentlyRead More →
Through our Dynamic Threat Intelligence (DTI), we have observed multiple campaigns targeting multiple industries in the United States, United Kingdom, South Korea, Brazil, United Arab Emirates, Singapore, Canada, Peru andRead More →
Ping of pwn: Malicious UDP packets may take over gear. A Linux kernel flaw that potentially allows miscreants to remotely control vulnerable servers, desktops, IoT gear, Android handhelds, and more,Read More →
Security researchers from Pen Test Partners have discovered pretty glaring security flaws in Aga’s line of smart ovens. According to researchers, these flaws can be exploited via SMS messages. TheRead More →
A JavaScript file secretly loaded without your knowledge on a site, or app you load on your mobile device, can access data from various sensors and collect information needed toRead More →
A hacker, or group of hackers, has set off all 156 tornado sirens in the city of Dallas, Texas, on the night between Friday and Saturday, April 7 and 8.Read More →
Nobody seems to know what kind of technology Trump was using during his airstrike on Syria. President Trump ordered a missile strike on Syria last night in response to aRead More →
This article sheds light on the current ecosystem of the Sathurbot backdoor trojan, in particular exposing its use of torrents as a delivery medium and its distributed brute-forcing of weakRead More →