You Can Hack Into a Linux System by Pressing Backspace 28 Times
Grub Vulnerability : You can Hack into a Linux PC/laptop just by pressing ‘Backspace’ 28 times Most of us swear by Linux as a super secure operating system but twoRead More →
Data Security News | Infosec Blog | Information Security Tutorials
Grub Vulnerability : You can Hack into a Linux PC/laptop just by pressing ‘Backspace’ 28 times Most of us swear by Linux as a super secure operating system but twoRead More →
Digital forensics is one of the fields often overlooked by aspiring hackers. In a rush to exploit every and any system they can, they often ignore learning digital forensics—the fieldRead More →
FireEye security equipment can be compromised, Google finds. Two security researchers working for Google have discovered a simple method of compromising FireEye security products, which, ironically, are installed to prevent aRead More →
The Tokyo Metropolitan Police Department has taken maintaining law and order to another level: it uses a massive drone to catch other drones trespassing in its sky. Any drone flyingRead More →
VTech site remained vulnerable to an old SQL injection exploit. UK police said they have arrested a 21-year-old man in connection to the November breach of electronic toymaker VTech, aRead More →
There is an increase in people who have been victims of identity theft and unauthorized use of credit cards because of many companies that handle data irresponsibly. According to manyRead More →
Attackers carry out SMS fraud via the infected phones. The Android/OpFake and the Android/Marry malware families, two banking trojans targeting mobile devices, have (improperly) stored their C&C servers inside Facebook Parse,Read More →
The Obama administration’s calls for backdoors echo the Clinton-era key escrow fiasco. In the face of a Federal Bureau of Investigation proposal requesting backdoors into encrypted communications, a noted encryptionRead More →
Researchers are still looking for a Tor alternative.Scientists at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) have created an anonymous messaging system, in the same category as Tor,Read More →
Experts at FireEye have discovered a stealthy botnet relying on a backdoor called LATENTBOT has compromised companies around. Experts at FireEye have discovered a stealthy botnet relying on a backdoor called LATENTBOTRead More →