A new Windows vulnerability affects versions 8 and 10
The flaw is being exploited by at least two malicious actors; Users are encouraged to install updates as soon as they are. The most recent Microsoft weekly update package focusedRead More →
The flaw is being exploited by at least two malicious actors; Users are encouraged to install updates as soon as they are. The most recent Microsoft weekly update package focusedRead More →
According to police reports, the 21 year old earned over $200k USD by selling the stolen accounts A 21-year-old Australian youth was arrested after generating more than $200k USD inRead More →
This advertising software is located in 210 Android apps available in the official Google Play store A figure close to 150 million of Android device users could have downloaded andRead More →
Three companies in the videogame industry established in Asian countries have been affected by this attack campaign According to experts in network security and ethical hacking from the International Institute of CyberRead More →
The service is free and has secure encryption Mozilla recently announced the launch of Firefox Send, a free-use service to send and receive files on an encrypted platform, report network security and ethicalRead More →
Microsoft has not released update patches for this bug Network security and ethical hacking specialists from the International Institute of Cyber Security report the emergence of a new vulnerability in Microsoft Word.Read More →
The code of this malware has existed for more than a decade, although there is always a malicious actor willing to update it Network security and ethical hacking specialists from theRead More →
The flaw could have been exploited to obtain random images stored on a user’s device According to network security experts from the International Institute of Cyber Security, an ethical hacker received aRead More →
Experts demonstrated the ease with which these devices can be unlocked by any user The biometric block screen based on face recognition of the Samsung Galaxy S10 can be compromised in aRead More →
A group of, allegedly Iranian, hackers stole around 6 TB of confidential information According to network security and ethical hacking specialists from the International Institute of Cyber Security, Citrix, the enterprise management softwareRead More →
It is still unknown how long the information remained exposed Network security and ethical hacking specialists from the International Institute of Cyber Security reported a massive data leaking from multiple onlineRead More →
Local government officials had to pay almost half a million dollars to regain access to their systems According to network security and ethical hacking specialists from the International Institute of Cyber Security, ransomware infectionsRead More →
The applicants’ files of three prestigious universities would have been compromised by malicious actors The process of appliance to a university can be complicated, even more in a context whereRead More →
Gmail, from Google, is one of the main services that use this login method Network security and ethical hacking specialists from the International Institute of Cyber security ensure that malicious actorsRead More →
The flaw is in a browser code included on the messaging service Facebook is making some changes to its messaging services, although this could backfire on the process. According toRead More →
The expert has been criticised for the method he used to discover this flaw Network security and ethical hacking specialists recently discovered a vulnerability that exposes to denial of service (DoS) attacks toRead More →
The flaw requires being combined with a Chrome browser exploit Network security and ethical hacking specialists from the International Institute of Cyber Security recommend Windows operating system users to upgrade to version 10Read More →
The company will launch a new firmware for Nexus in which the POAP function is completely disabled For security reasons, the Cisco company has asked the users of its Nexus switch toRead More →
The Japanese government claims that the vast majority of these attacks originated abroad According to network security and ethical hacking specialists from the International Institute of Cyber Security, in 2018 the numberRead More →
Again, a data leaking relates to the poor security of a MongoDB implementation The Dalil Caller ID app, developed in Saudi Arabia, has been leaking the information of its usersRead More →