New attacks on the 4G LTE network
The 4G LTE is already the mobile network standard that is most used today, being responsible for 83.73% of coverage availability. Therefore, it is really dangerous that a group ofRead More →
Data Security News | Infosec Blog | Information Security Tutorials
The 4G LTE is already the mobile network standard that is most used today, being responsible for 83.73% of coverage availability. Therefore, it is really dangerous that a group ofRead More →
The number of Flash Player exploits has recently declined, due to Adobe’s introduction of various measures to strengthen Flash’s security. Occasionally, however, an exploit still arises. On January 31, Kr-Cert reported aRead More →
It has always been written about website security certificates many times. This is because HTTPS certificates (TLS certificates) are one of the main parties in the security of online transactions.Read More →
Hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng, MDK3 and Reaver. It offers a simple and easy UI to use these tools without typing commandsRead More →
Memcached is a distributed system that allows the caching of information in RAM. This software seeks to accelerate the search and access to information. Instead of going to the disk,Read More →
There can never be too many IoT gadgets – that’s what people usually think when buying yet another connected device with advanced functionality. From our perspective, we also think there can’t beRead More →
A peculiarity in SAML libraries has left many single-sign-on (SSO) implementations vulnerable to abuse. It allows an attacker that has gained any authenticated access to trick the system into grantingRead More →
Icebreaker Automates network attacks against Active Directory to deliver you plaintext credentials when you’re inside the network but outside of the Active Directory environment. Cyber security researchers explain that Icebreaker perform 5Read More →
Open Bug Bounty consists of a team of no more than 10 researchers from several countries with backgrounds in IT, cyber security and law, who work to verify vulnerabilities, promptly notify websiteRead More →
More than 10,000 credit and debit card holders have been affected by a data breach reported by Punjab National Bank (PNB). Cyber security experts believe that the card details of customersRead More →