Ship Hacking puts operations in English Channel at risk
Commonlly used technology for ship monitoring can be hacked to falsify the location and size of boats for the purpose of firing collision alerts from other boats, point out recentRead More →
Data Security News | Infosec Blog | Information Security Tutorials
Commonlly used technology for ship monitoring can be hacked to falsify the location and size of boats for the purpose of firing collision alerts from other boats, point out recentRead More →
Facebook has to stifle another attack on its information security, as the social network admitted to have inadvertently publicized some of the private messages of its users, which means thatRead More →
Marcus Hutchins, the hero behind the switch of the WannaCry virus, faces new accusations regarding the separate malware that the security investigator allegedly created. Hutchins, a British citizen, was detainedRead More →
Shopin, the first universal shopper profile offering the most personal shopping experience on reseller, app and store websites via blockchain and Artificial Intelligence, today released an official statement that a significantRead More →
MyHeritage, an Israeli DNA, and genealogy website has suffered a massive data breach in which email accounts and hashed passwords of 92 million users (92,283,889) who signed up to the service upRead More →
Recently cryptojacking attacks have been spreading like wildfire. At Imperva we have witnessed it firsthand and even concluded that these attacks hold roughly 90% of all remote code execution attacks inRead More →
According to information security experts, GyoiThon identifies the software installed on the web server as OS, Middleware, Framework, CMS, etc. Then, run valid exploits for the software identified using Metasploit. Finally, itRead More →
Dutch banks ABN Amro and Rabobank affected by DDOS attacks on May 27, which has affected their online banking system with offline servers. Information security experts commented that malicious actorsRead More →
Pornhub is always taking care of us, this time with a free VPN service. Nowadays it is very difficult to obtain a reliable free VPN service without compromising your privacyRead More →
This is a tool that allows you to create multiple TOR instances with load balancing traffic between them HAProxy. The tool provides a single endpoint for clients. Also, you canRead More →