Mining Malware attacks Amazon’s FireTV
A new strain of mining malware reaches the Android based TV systems, in specially Fire TV series, by Amazon. If you have an Amazon FireTV and it stops playing videosRead More →
A new strain of mining malware reaches the Android based TV systems, in specially Fire TV series, by Amazon. If you have an Amazon FireTV and it stops playing videosRead More →
Cortana has security vulnerabilities when it operates on the lock screen Microsoft has launched a security update to prevent hackers from entering PC via Cortana, the digital assistant integrated intoRead More →
Hackers are a huge threat to organizations, so ethically practiced hacking is often the best way to protect them from these attacks. The nature of the attacks on computerRead More →
Coinrail, cryptocurrency exchange established in Korea, suffered a massive hack attack in which the responsible hackers stole more than 40 million dollars in tokens and Altcoins last Sunday. International InstituteRead More →
Another patch has been released with security updates for Adobe Flash Player for Windows, MacOS, Linux and Chrome OS that works on multiple critical vulnerabilities. On June 7, Adobe SecurityRead More →
The U.S. Federal Trade Commission (FTC) wants to know if you have been a victim of a malicious websites using your computer to mine cryptocurrency. You’ll find a way toRead More →
Commonlly used technology for ship monitoring can be hacked to falsify the location and size of boats for the purpose of firing collision alerts from other boats, point out recentRead More →
Facebook has to stifle another attack on its information security, as the social network admitted to have inadvertently publicized some of the private messages of its users, which means thatRead More →
Marcus Hutchins, the hero behind the switch of the WannaCry virus, faces new accusations regarding the separate malware that the security investigator allegedly created. Hutchins, a British citizen, was detainedRead More →
Shopin, the first universal shopper profile offering the most personal shopping experience on reseller, app and store websites via blockchain and Artificial Intelligence, today released an official statement that a significantRead More →
MyHeritage, an Israeli DNA, and genealogy website has suffered a massive data breach in which email accounts and hashed passwords of 92 million users (92,283,889) who signed up to the service upRead More →
Recently cryptojacking attacks have been spreading like wildfire. At Imperva we have witnessed it firsthand and even concluded that these attacks hold roughly 90% of all remote code execution attacks inRead More →
The Bureau says there are fewer protected iPhones. The FBI has long been one of the main parties asking for backdoors in smartphones, explaining on several occasions through the voice ofRead More →
40-year-old SS7 is being actively used to track user locations and communications. The US Department of Homeland Security recently warned that malicious hackers may have targeted US phone users byRead More →
With the staggering amount of features that were introduced through HTML5 and CSS3 the attack surface of browsers grew accordingly. Consequently, it is no surprise that interactions between such featuresRead More →
Server and cloud misconfigs continue to plague companies and their customers: This week it came to light that a Universal Music Group contractor neglected to protect an Apache Airflow server,Read More →
According to information security experts, GyoiThon identifies the software installed on the web server as OS, Middleware, Framework, CMS, etc. Then, run valid exploits for the software identified using Metasploit. Finally, itRead More →
A research conducted by information security experts showed that using sonic and ultrasonic waves as a weapon, malicious actors could interrupt read, write and store functions of a hard diskRead More →
Professionals explain that automatic tank gauges (ATG) give information about gasoline inventory and protect groundwater from gasoline leaks. A while ago, it revealed that ATGs in approximately 5,000 service stationsRead More →
An information security expert explains that, Archery is an open source vulnerability management and evaluation tool that helps developers and evaluators perform scans and manage vulnerabilities. Archery uses open source tools toRead More →