Hacking Mac With EmPyre
I am the stereotypical Apple fan boy that other bloggers write about. We have MacBook Pro’s, Air’s, Apple TV’s, iPhone’s and iPad’s and even subscribe to Apple Music. You literally couldn’tRead More →
Data Security News | Infosec Blog | Cyber Security Tutorials
I am the stereotypical Apple fan boy that other bloggers write about. We have MacBook Pro’s, Air’s, Apple TV’s, iPhone’s and iPad’s and even subscribe to Apple Music. You literally couldn’tRead More →
New rooting technique is believed to work against every version. There’s a new method for rooting Android devices that’s believed to work reliably on every version of the mobile operating systemRead More →
Recently a massive DDoS attack has disconnected a large portion of users from the Internet, hackers exploited IoT devices. Is your router secure? “Are we ready to live in a worldRead More →
Trojan targets desktops, not servers or IoT devices. Malware authors are taking aim at Linux computers, more precisely desktops and not servers, with a new trojan named FakeFile, currently distributed inRead More →
In writing the most recent Hack This (“Scrape the Web with Beautiful Soup”) I again found myself trapped between the competing causes of blog-brevity and making sure everything is totallyRead More →
Lurking in the kernel for nine years, flaw gives untrusted users unfettered root access. A serious vulnerability that has been present for nine years in virtually all versions of the LinuxRead More →
Yesterday, GData malware analyst Karsten Hahn discovered an in-development ransomware disguised as a click me game. When executed the ransomware will launch a screen that contains a Click Me button that a userRead More →
Russian man drove luxury car, then collapsed after being apprehended, police say. An alleged Russian hacker arrested in the Czech Republic following an FBI-coordinated tip-off is suspected of taking part in aRead More →
Biggest credit card replacement in India’s history. The State Bank of India (SBI) said today it decided to block over 600,000 debit cards after rumors of a malware infection onRead More →
As we keep a tab on exploit kits, today we are looking at some changes with Sundown EK. Nowhere near as popular as RIG EK, this exploit kit still remains aRead More →