Code of destruction – malware analysis
We should always think twice before running an unknown program downloaded from the Internet. Of course not every application is dangerous, but it’s all too easy to find a maliciousRead More →
Cyber Security Incident News | Infosec Blog | Information Security Tutorials
We should always think twice before running an unknown program downloaded from the Internet. Of course not every application is dangerous, but it’s all too easy to find a maliciousRead More →
Hacktivists from Ghost Squad Hacker group made revealed the identities of hackers affiliated with the ISIS cyber army called United Cyber Caliphate. Ghost Squad Hackers (GSH), a hacktivist group madeRead More →
Almost 1.7 million users affected by latest breaches. A hacker who goes by the name of uid0 claims to have breached three websites belonging to Penton Technology: Hot Scripts, Mac Forums,Read More →
Some attacks are hard to spot even by human subjects. A series of distorted voice commands surreptitiously hidden in YouTube videos can force unprotected Android or iOS smartphones to carry outRead More →
We put people first in everything we do at Messenger, and today we are beginning to roll out a new option within Messenger to better support conversations about sensitive topics.Read More →
A research discovered two zero-day vulnerabilities residing in the official BMW web domain and ConnectedDrive portal that allow remote hack. Once again IoT devices are affected by a serious flawRead More →
The number of locations affected rocketed by more than three-fold. Restaurant chain Wendy’s said that the number of restaurants affected by a credit card hack has more than tripled since itsRead More →
For a few days, I’m seeing a lot of phishing emails that try to steal credentials from victims. Well, nothing brand new but, this time, the scenario is quite different :Read More →
The domain name’s new owners want $2.5 million to give it back. In common with many other vendors, TP-Link, one of the world’s biggest sellers of Wi-Fi access points and homeRead More →
ESET analyzes multiple samples targeting OS X every day. Those samples are usually potentially unwanted applications that inject advertisements into browser displays while the victim is browsing the web. For theRead More →