GPS spoofing and dangers of GPS data hacking
Hacking Global Positioning System with GPS ‘Spoofing’ Can Lead To Fatalities. Imagine you are relying on Google Maps and suddenly it leads you to an unwanted/dangerous place. Up to nowRead More →
Data Security News | Infosec Blog | Information Security Tutorials
Hacking Global Positioning System with GPS ‘Spoofing’ Can Lead To Fatalities. Imagine you are relying on Google Maps and suddenly it leads you to an unwanted/dangerous place. Up to nowRead More →
As a result of a lot of hard work done by our security research teams, we revealed today a new and alarming malware campaign. The attack campaign, named Gooligan, breachedRead More →
Security expert discovers flaw in Windows 10 in-place upgrade system that gives hackers admin rights. Getting administrator privileges on a Windows 10 computer no longer requires complex tactics and malware,Read More →
Benjamin Dumke-von der Ehe found an interesting way to steal data cross domain. Using JS proxies he was able to create a handler that could steal undefined JavaScript variables. ThisRead More →
The San Francisco Municipal Transportation Agency (SFMTA) was hit with a ransomware attack on Friday, causing fare station terminals to carry the message, “You Hacked. ALL Data Encrypted.” Turns out, theRead More →
Short Bytes: The Tor Project has released Tor Phone–a privacy-focused and secure version of Android mobile OS. It’s based on Copperhead OS, a hardened Android distribution. Tor Phone also usesRead More →
Our researchers have demonstrated that because of lack of security in the Tesla smartphone app, cyber criminals could take control of the company’s vehicles, to the point where they canRead More →
An ongoing spam campaign is using boobytrapped image files to download and infect users with the Locky ransomware, Israeli security firm Check Point reports. aMalware authors are spreading malicious imageRead More →
Admittedly, that’s somewhat of a click-bait blog post title but bear with us, it’s for a good reason. Lots of work goes on behind the scenes of Kali Linux: toolsRead More →
Will Dormann, a Vulnerability Analyst for the US-CERT Coordination Center (CERT/CC), is advising Microsoft to continue developing EMET because Windows 10 does not provide the same protection measures, in spiteRead More →