How to hack computer using THEFATRAT and BEEF?
This note will explore the life cycle of an attack, how a victim may be infected and what an attacker could do to avoid detection by antivirus systems (AV). GeneralRead More →
This note will explore the life cycle of an attack, how a victim may be infected and what an attacker could do to avoid detection by antivirus systems (AV). GeneralRead More →
A security flaw in the Skype update process can allow an attacker to gain system-level privileges on a vulnerable computer. “…the error, if exploited, can derive a local user whoRead More →
Lizard Squad is a group of hackers that was dedicated to cause damage through DDoS attacks. Throughout their career they came to knock down many of the most popular services,Read More →
OnePlus has confirmed that more than 40,000 customers have been affected by an attack on the payment page by a malicious code has been operating capturing and sending information fromRead More →
A number of professionals in information security can be asked if at this time the existing technology is reliable enough to make use of a system as widespread as WindowsRead More →
If you haven’t updated your Windows app lately, now would be a good time. Makers of the Telegram instant messenger have fixed a critical vulnerability that hackers were actively exploitingRead More →
The Kali Linux development team, one of the best-known and most widely used information security distributions, has released the first version of 2018. The new Kali Linux 2018.1 version incorporatesRead More →
Every day we hear news of more malware endangering the information security of users. Therefore, the main companies, such as Dropbox, Google Drive and OneDrive, offer an advanced malware protectionRead More →
Winter Olympics officials have confirmed that a cyberattack occurred during the games’ opening ceremony on Feb. 9, but are remaining mum on the source of the attack. Researchers say theRead More →
A technique widely used to avoid hacking a computer is to isolate it completely from the network, known as air-gapped. This technique was used to write the script of theRead More →
Decatur County General Hospital in Parsons, Tennessee, is notifying more than 20,000 individuals that their health information was potentially compromised by an incident last year involving cryptocurrency mining software discoveredRead More →
The Information Commissioner’s Office (ICO) took down its website after a warning that hackers were taking control of visitors’ computers to mine cryptocurrency. Security researcher Scott Helme said more thanRead More →
Talos has identified a targeted attacks affecting the Middle East. This campaign contains the following elements, which are described in detail in this article. The use of allegedly confidential decoyRead More →
The private exploit seller is expanding its reach to acquire bugs in popular Linux builds. Zerodium is offering $45,000 to hackers willing to privately report zero-day vulnerabilities in the LinuxRead More →
With a globally interconnected society, cases of harassment through the internet grow every day, although you have to know how to identify yourself when it comes to a crime orRead More →
A company in information security recommended to update as soon as possible Adobe Flash Player 28.0.0.161, the latest version of Adobe released as an emergency patch due to a criticalRead More →
Google has been rewarding for years for finding vulnerabilities in some of its products. Having started the program in November of 2010, the company has recognized that it has paidRead More →
According to the information security companies, hidden cryptocurrency mining is very common lately. The boom of recent months in terms of the price of cryptocurrency and the interest of users has madeRead More →
Cybercriminals have found a new security flaw that they can exploit to install POS malware in Oracle Micros’ point-of-sale systems. Oracle has already issued updates for this problem. However, thisRead More →
2017, Google eliminated a total of 700,000 malicious applications published within its Play Store that had passed the security controls and had endangered the users of this operating system. TheseRead More →