Tech Support Scammers Get Serious With Screen Lockers
Tech support scammers are well aware of what is going on in the malware scene and often rip off ideas and concepts from other criminals. We see this today with for exampleRead More →
Tech support scammers are well aware of what is going on in the malware scene and often rip off ideas and concepts from other criminals. We see this today with for exampleRead More →
According to the global perspective of enterprise data security company; integrity, confidentiality, availability, auditability, and non-repudiation are the five fundamental pillars for any business data security solution. For small andRead More →
There are statistical evidences supported by data destruction companies which present that in countries like Mexico, Brazil, United States, Colombia, Costa Rica, Argentina, UAE, and India; two out of threeRead More →
The FireEye researcher Genwei Jiang revealed the exploit chain related to phishing attacks leveraging CVE-2016-4117 flaw recently fixed by Adobe. Security experts at FireEye have recently spotted an attack leveragingRead More →
Popular ISP utility exposed to new cache poisoning attack. Squison is the name of a recently discovered security bug in the Squid proxy server, a popular Linux utility deployed by manyRead More →
GhostShell, the Romanian hacker who recently revealed his true identity in a very candid exposé, has returned to the world of hacking with a new leak as part of hisRead More →
Onapsis and US-CERT warned about attacks against 36 companies, another security firm begs to differ. The impact of a five-year-old security issue affecting SAP customers that has recently resurfaced has beenRead More →
The boom in PoS systems in the US has its drawbacks. Researchers from FireEye have disclosed the details of cyberattack group leveraging a Microsoft Windows zero-day flaw in targeted attacks againstRead More →
Hardcore fetish forum, Rosebutt Board hacked, traceable personal details leaked. The online hardcore fetish forum called Rosebutt Board was hacked by unknown hackers who leaked personal identifiable information of more thanRead More →
Allwinner’s ARM Linux kernel includes “rootmydevice” code that gives apps root. Allwinner, a Chinese system-on-a-chip company that makes the processor used in many low-cost Android tablets, set-top boxes, ARM-based PCs,Read More →
The information security plan describes how the security is implemented, defined policies, controls and solutions. The information security plan is developed considering all the IT resources depending on the securityRead More →
Exploits exist for both bugs and allow for remote code execution. Windows users woke up to something that doesn’t happen every day: the disclosure of two zero-day vulnerabilities, one in theRead More →
Whistleblowing is overshadowed when SQL injection gives way to unauthorized access. A Florida man has been slapped with felony criminal hacking charges after gaining unauthorized access to poorly secured computer systemsRead More →
Recorded Future’s real-time threat intelligence product allows analysts access to hundreds of thousands of sources that are normalized, organized, and searchable for analysis rather than simple keyword search. In thisRead More →
.. but security researchers already cracked it According to security experts from Cylance, in the underground world of ransomware peddlers, there’s no ransomware kit better than AlphaLocker, sold by a RussianRead More →
Lenovo Solution Center allowed attackers to get admin access. Lenovo has hid a crucial security update in an old security advisory from last year. The advisory details fixes for a vulnerabilityRead More →
Fix still isn’t available for most users, and many will probably never get it.For the past five years, a vulnerability in many Android phones has left users’ text messages, callRead More →
imageMagick project hopes to publish a patch today. Two Russian security researchers revealed a few hours ago a vulnerability in the ImageMagick image processing library deployed with countless Web servers, aRead More →
19-year-old college student fixes Steam’s crypto. Valve has updated the Steam gaming client to fix a severe security issue in the application’s crypto package. Under certain conditions, this issue would haveRead More →
Cyber security refers to the set of solutions, services and trainings that can be implement by a company or an organization for cyber defense against cyber attacks. According to theRead More →