Snowden document suggests NSA could have proof of Russian hack
Looks like the NSA has a history of positively identifying Russian hacks. The FBI, CIA and President Barack Obama all agree that Russia hacked the DNC and asserted its willRead More →
Cyber Security Incident News | Infosec Blog | Information Security Tutorials
Looks like the NSA has a history of positively identifying Russian hacks. The FBI, CIA and President Barack Obama all agree that Russia hacked the DNC and asserted its willRead More →
On the last day of 2016, KeepKey, a vendor of Bitcoin hardware wallets, has notified users of a security breach that inadvertently exposed some of its customers’ details. According toRead More →
An attacker going by the name of Harak1r1 is hijacking unprotected MongoDB databases, stealing their content, and asking for a Bitcoin ransom to return the data. These attacks have beenRead More →
The Windows kernel privilege escalation vulnerability CVE-2016-7255 has received a lot of media attention. On November’s Patch Tuesday, Microsoft released a fix for this vulnerability as part of bulletin MS16-135.Read More →
Changing travelers flight bookings is too easy. Absolutely astounding the Karsten Nohl research on the insecurity of traveler flight information. The current travel booking systems is deeply insecure, it lacksRead More →
Facebook has started nudging people to not only create live videos, but consume them too. An update automatically pushes more live video to your smartphone screen. A bunch of peopleRead More →
US issued JAR billed itself as an indictment that would prove Russian involvement. Talk about disappointments. The US government’s much-anticipated analysis of Russian-sponsored hacking operations provides almost none of theRead More →
Police in Shelton, Connecticut have arrested a teenager for launching DDoS attacks on his/her former high school’s network. According to a Shelton Police press release, the yet unnamed teenager wasRead More →
Short Bytes: Fossbytes has prepared a useful list of the best hacking tools of 2017 based upon industry reviews, your feedback, and its own experience. This list has been verfiedRead More →
Steganography, the technique of embedding hidden messages inside public files, has become very popular with exploit kit operators in 2016. Several security firms have detected multiple updates to exploit kitsRead More →