Windows Built-In PDF Reader Exposes Edge Browser to Hacking
WinRT PDF exposes users to drive-by attacks. WinRT PDF, the default PDF reader for Windows 10, opens Edge users to a new series of attacks that are incredibly similar to howRead More →
Data Security News | Infosec Blog | Information Security Tutorials
WinRT PDF exposes users to drive-by attacks. WinRT PDF, the default PDF reader for Windows 10, opens Edge users to a new series of attacks that are incredibly similar to howRead More →
Locky is a new ransomware that has been released (most probably) by the Dridex gang (source). Not surprisingly, it is well prepared, which means that the threat actor behind itRead More →
Short Bytes: Brazilian police have arrested Diego Dzodan, Facebook’s Latin American regional vice-president, for failing to provide WhatsApp messages related to a case of drug-trafficking. In response, Facebook has said that WhatsAppRead More →
Spam posts on Facebook are nothing new. Since videos continue to be a staple form of entertainment—a whopping 8 billion views per day according to last year’s numbers—within the socialRead More →
Until recently, sample wasn’t detected by any of the top antivirus programs. Researchers have uncovered what appears to be newly developed Mac malware from HackingTeam, a discovery that’s prompting speculation thatRead More →
If your corporate network is connected to the Internet, you are doing business on the Internet, you manage web applications that keep confidential information or you are a provider ofRead More →
The journalist Steven Petrow had his computer hacked while on a plane, it was a shocking experience that raises the discussion on privacy. Experts in the aviation industry are spendingRead More →
‘Sybil’ nodes could be used to de-anonymise traffic. The Tor Project is working with Princeton University boffins to try and identify possibly malicious nodes, and prevent them from harvesting traffic byRead More →
Other than an Apple backdoor hack, FBI could use 3 other hacks on killer’s iPhone. According to hardware-security experts, there are at least three ways the FBI could try to removeRead More →
All it takes to hack security cameras and bank accounts is an email, demonstrates a hacker. What happens when you challenge a series of extremely dexterous hackers to hack your bankRead More →