Road Warriors: Beware of ‘Video Jacking’
A little-known feature of many modern smartphones is their ability to duplicate video on the device’s screen so that it also shows up on a much larger display — likeRead More →
Data Security News | Infosec Blog | Information Security Tutorials
A little-known feature of many modern smartphones is their ability to duplicate video on the device’s screen so that it also shows up on a much larger display — likeRead More →
Scylex – “the next big thing” in terms of banking trojan. Threat-intel experts from Heimdal Security and the CSIS Security Group have uncovered a new banking trojan called Scylex, currently advertisedRead More →
“DiskFiltration” siphons data even when computers are disconnected from the Internet. Researchers have devised a new way to siphon data out of an infected computer even when it has been physicallyRead More →
The good news? Hacks are limited for now. The bad news? Hackers will get better. Security researchers are eager to poke holes in the chip-embedded credit and debit cards that haveRead More →
What do spies use to chat online? A terribly ugly Windows programme. At least, that’s what the Five Eyes intelligence alliance (made up of the US, UK, Australia, New Zealand andRead More →
“Off-path” attack means hackers can be anywhere with no man-in-the-middle needed. Computer scientists have discovered a serious Internet vulnerability that allows attackers to terminate connections between virtually any two partiesRead More →
A team researchers at Arizona State University (ASU) is crawling the Darkweb searching for zero-days for Proactive Cybersecurity Threat Intelligence.Can finding zero-day vulnerabilities be as easy as crawling the Darkweb?Read More →
LAS VEGAS–Microsoft’s Windows 10 includes many innovative security features that are intended to help minimize risk and improve user experience. One such feature is Credential Guard, which aims to protectRead More →
Espionage platform with more than 50 modules was almost certainly state sponsored. Security experts have discovered a malware platform that’s so advanced in its design and execution that it could probablyRead More →
Advances in software application development designed to protect us against malware evolve positively forward every day, yet the threat of cybercrime continues. But if we understand how ‘malware robots’ useRead More →