Return of the EXIF PHP Joomla Backdoor
Our Remediation and Research teams are in constant communication and collaboration. It’s how we stay ahead of the latest threats, but it also presents an opportunity to identify interesting threatsRead More →
Data Security News | Infosec Blog | Information Security Tutorials
Our Remediation and Research teams are in constant communication and collaboration. It’s how we stay ahead of the latest threats, but it also presents an opportunity to identify interesting threatsRead More →
Denis Andzakovic, a security researcher for Security Assessment, has created a tool that can fool the KeePass password manager into exporting its internal passwords database as a CSV file, showingRead More →
Wallets are becoming more integrated with other things. Soon, we might all use our phones as a way to pay for things. However, the ultimate way to ensure that youRead More →
Earlier this month, exploit acquisition platform Zerodium debuted an iOS 9 bug bounty that would pay out up to three million dollars to hackers who managed to develop a browser-basedRead More →
Facebook’s is always changing and its team is adding new functionality every couple of months. With new changes there are chances of affecting security and introducing vulnerabilities explains an informationRead More →
Timing attacks are an interesting part of computer security. As an extreme example, imagine that your computer took one second to verify each character in your login password. And nowRead More →
Snapchat’s new term and conditions have resulted in outrage from its users and twitter has been flooded with tweets from users rejecting company’s new terms and conditions. Snapchat is oneRead More →
A laptop filled with data? An external HDD filled with even more data? There’s bound to be a phone – possibly two if you spend a lot of time inRead More →
In the wake of the TalkTalk Scandal, Vodafone finally admitted that hackers did manage to steal around 20,000 Vodafone customers’ bank details. According to the Mobile Phone provider firm, hackersRead More →
My last on-topic post pontificated about the dangers and surprise of letting third parties into your house or codebase, where I discussed the addition of a TV DVR system to myRead More →