New Jersey Town Website Hacked 8 Times in 20 Days
Website is currently down, nobody knowns who hacked it. Between July 7 and July 26, the date of the last reported hack, the website of the Harrison city council, townofharrison.com, hasRead More →
Malware News | Infosec Blog | Information Security Tutorials
Website is currently down, nobody knowns who hacked it. Between July 7 and July 26, the date of the last reported hack, the website of the Harrison city council, townofharrison.com, hasRead More →
X-Tunnel is roughly based on XTunnel PortMap. One of the malware variants used to infiltrate and hack the Democratic National Committee (DNC) back in April 2016 is based on aRead More →
Our team recently discovered a new Android Trojan called SpyNote which facilitates remote spying. The builder, which creates new versions of the malware, recently leaked on several malware discussion forums.Read More →
TIM BRYANT AND Brian Knudson spent two years preparing for the Cyber Grand Challenge, a $55 million hacking contest cooked up by Darpa, the visionary research operation inside the U.S.Read More →
A new wave of Locky malware emails have been making the rounds since yesterday — July 20, 2016 — with a critical new development, whereby the Windows executable is nowRead More →
The HTML Source Code Viewer app by Sunuba Gaming poses as a development tool then steals pictures and videos from mobile devices. Last time we blogged about malware on GoogleRead More →
When ransomware authors compete on the black market, sometimes victims benefit. This time we got access to private keys of the Chimera ransomware. They have been leaked online and sharedRead More →
Short Bytes: TOR anonymity network is one of the most useful online security measures that we’ve got. However, attackers have come up with new ways to puncture this security envelopeRead More →
Despite being older than many of its users, Short Messaging Service (SMS) remains a very popular communications medium and is increasingly found on remote sensors, critical infrastructure and vehicles dueRead More →
Hack can be carried out by operators of Wi-Fi hotspots, where HTTPs is needed most. A key guarantee provided by HTTPS encryption is that the addresses of visited websites aren’t visibleRead More →