Petya – Taking Ransomware To The Low Level
Petya is different from the other popular ransomware these days. Instead of encrypting files one by one, it denies access to the full system by attacking low-level structures on theRead More →
Data Security News | Infosec Blog | Information Security Tutorials
Petya is different from the other popular ransomware these days. Instead of encrypting files one by one, it denies access to the full system by attacking low-level structures on theRead More →
Lauri Love faces extradition to US over hitting Federal Reserve, among others. At a court hearing earlier this month, the UK’s National Crime Authority (NCA) demanded that Lauri Love, a British computerRead More →
FOR THE PAST few years, Trevor Paglen has been at the vanguard of a movement of fine artists who have led gallery-goers to grapple with the realities of online privacyRead More →
Hacking like in the movies! Sometimes it’s that easy.If you ever want to impress your friends and hack doors with one command and a push of a button, like inRead More →
Security researchers from SentinelOne have discovered a security vulnerability affecting the Apple System Integrity Protection (SIP). Security researcher Pedro Vilaça from SentinelOne has discovered a security vulnerability ( CVE-2016-1757) affectingRead More →
The United States Marine Corps has launched on March 25th a new hacker support unit named Marine Corps Cyberspace Warfare Group. It is unnecessary to remind the importance of cyber capabilitiesRead More →
VNC Roulette allows you to randomly view insecure desktops accessible over the internet. Recently, a new website has come up on the Internet, which allows visitors to view random screenshots takenRead More →
Chinese state media is full of praise for the hacker accused of stealing a US F-35 Fighter Plane. A state-run media last Wednesday said that spying on the US is aRead More →
FBI is fighting back against the federal judge’s order to reveal the Tor Exploit and with DoJ filed a sealed motion requesting the review of the ruling. A few weeksRead More →
Backdoor.Dripion was custom developed, deployed in a highly targeted fashion, and used command and control servers disguised as antivirus company websites. In late August 2015, Symantec identified a previously unknownRead More →