Mobile apps and stealing a connected car
The concept of a connected car, or a car equipped with Internet access, has been gaining popularity for the last several years. The case in point is not only multimediaRead More →
Cyber Security Incident News | Infosec Blog | Information Security Tutorials
The concept of a connected car, or a car equipped with Internet access, has been gaining popularity for the last several years. The case in point is not only multimediaRead More →
Plus a new, stealthy “anonymous” stick, because that’s what the world really needed. Remember the USB Killer stick that indiscriminately and immediately fries about 95 percent of devices? Well, nowRead More →
Researchers from Boston University, North Carolina State University, and George Mason University have created a new protocol called TumbleBit that they say can anonymize Bitcoin transactions better than any otherRead More →
Islamic State supporters are being targeted with a modified version of the Telegram Android app that contains a version of the OmniRAT remote access toolkit. The app, named plus_gram.apk, isRead More →
JavaScript Web Service Proxies are an alternative to WSDL (Web Services Description Language) files for interacting with WCF Web Services. The proxy files function as a description of the webRead More →
There’s a disturbing possibility that the Mexican government, the soda industry, or some combination of both used spyware to harass health advocates who support Mexico’s soft-drink tax. According to aRead More →
Watering hole attacks attempt to infect more than 100 organizations in 31 different countries. Organizations in 31 countries have been targeted in a new wave of attacks which has beenRead More →
Amster-damn, that’s a hell of a vulnerability to make browser bug exploitation easier. Researchers in Europe have developed a way to exploit a common computer processor feature to bypass aRead More →
Android users have been exposed to a new malicious app imitating Adobe Flash Player that serves as a potential entrance for many types of dangerous malware. The application, detected byRead More →
The security researchers at the Georgia Institute of Technology have simulated a ransomware-based attack on PLCs in a water treatment plant. The security researchers at the Georgia Institute of TechnologyRead More →