Flaws in Samsung’s ‘Smart’ Home Let Hackers Unlock Doors and Set Off Fire Alarms
A SMOKE DETECTOR that sends you a text alert when your house is on fire seems like a good idea. An internet-connected door lock with a PIN that can beRead More →
Data Security News | Infosec Blog | Cyber Security Tutorials
A SMOKE DETECTOR that sends you a text alert when your house is on fire seems like a good idea. An internet-connected door lock with a PIN that can beRead More →
Cyber security refers to the set of solutions, services and trainings that can be implement by a company or an organization for cyber defense against cyber attacks. According to theRead More →
Short Bytes: FBI has now got the power to hack any computer in the world with the help of a warrant from a U.S. judge. This new ruling was recently madeRead More →
Our research team has recently seen a large amount of activity in our cloud related to an Android infostealer disguised as a Google Chrome update. This malware is capable ofRead More →
Ransomware makes headlines when hospitals are taken offline or police departments pay cybercriminals to decrypt their files. Established threat actors have also begun distributing ransomware in high volumes (as withRead More →
A security researcher named Casey Smith published an article last week where he detailed how the Windows Regsvr32.exe command could be used to bypass AppLocker restrictions. In this article he described a notRead More →
How does the U.S. government beat Tor, the anonymity software used by millions of people around the world? By hiring someone with experience on the inside. A former Tor ProjectRead More →
Flaw allowed anyone to edit & take control over .as domains. A British security researcher that goes online only by the name of InfoSec Guy revealed today that American Samoa domainRead More →
Yesterday, a new ransomware called TrueCrypter was discovered by AVG malware analyst Jakub Kroustek. This ransomware encrypts your data using AES-256 encryption and then demands either .2 bitcoins or $115 USD inRead More →
Recently we observed an Android malware family being used to attack users in Russia. The malware samples were mainly distributed through a series of malicious subdomains registered under a legitimateRead More →