How a crook could have taken over your Facebook pages
It’s the third bug of the year for Facebook bounty hunter Laxman Muthiyah. At the start of 2015 he noticed that if you could view a photo album on Facebook,Read More →
Data Security News | Infosec Blog | Information Security Tutorials
It’s the third bug of the year for Facebook bounty hunter Laxman Muthiyah. At the start of 2015 he noticed that if you could view a photo album on Facebook,Read More →
Six teenagers, including an 18-year-old from West Yorkshire, have been arrested on suspicion of launching cyber attacks using a service created by a notorious hacking group which previously targeted XboxRead More →
A massive uptick in malvertising has taken place over the last few years and is becoming so popular that it may become the top technique used for drive by attacks,Read More →
Hackers, months ago, revived macros as an attack vector to primarily hide banking malware spread by spam campaigns. Not be left out, some targeted attacks kicked off by convincing phishingRead More →
Social engineering with very obvious assets blinds you to techno-toolkit. MILDLY NSFW A Chinese hardware hacker has hidden a penetration-testing toolkit into her high-heeled shoes. The Wi-Fi-popping platforms were forged inRead More →
Police suspect two suicides are related to the release of information stolen from the relationship-cheating website. Amid reports that the Ashley Madison security breach may have led to suicides andRead More →