What.cd Private Music Torrent Tracker Has Shut Down
What.cd, an invite-only music torrent tracker, has shut down yesterday, following a report in French media of police raids. The website, founded in 2007 and with an estimated database ofRead More →
Cyber Security Incident News | Infosec Blog | Information Security Tutorials
What.cd, an invite-only music torrent tracker, has shut down yesterday, following a report in French media of police raids. The website, founded in 2007 and with an estimated database ofRead More →
The owners of two Apple-dedicated YouTube channels, EverythingApplePro and iDeviceHelp, have found a flaw in the iOS passcode device protection system that allows an attacker to access the device’s data,Read More →
… Alternate Title: “Why I Love BHIS” So, I was gifted this cute little princessy-toy thing recently. My first thought was that my daughters will love this thing. My second thoughtRead More →
A new spam wave posing as emailed fax messages is delivering a malware downloader that fetches and installs a ransomware family known as PClock, a CryptoLocker clone. The ransomware, detectedRead More →
Hardware hacker Samy Kamkar has released a new tool called PoisonTap that is capable of a plethora of malicious actions, all of which work even against password-protected computers on whichRead More →
The firm will also implement security measures to prevent further breaches and will review policies twice per year. Adobe has received a fine of $1 million for a data breachRead More →
For the second time this year, the hacker group OurMine breached one of the online accounts of the Facebook CEO Mark Zuckerberg. For the second time, this year hackers seemsRead More →
A new ransomware called CryptoLuck has been discovered by Proofpoint security researcher and exploit kit expert Kafeine that is being distributed via the RIG-E exploit kit. While it has become common toRead More →
Security researchers from Dr.Web say they’ve identified a new malware family inside an Android app found on the Google Play Store under the name of “Multiple Accounts: 2 Accounts.” AtRead More →
The way users move fingers across a phone’s touchscreen alters the WiFi signals transmitted by a mobile phone, causing interruptions that an attacker can intercept, analyze, and reverse engineer toRead More →