Experts from CloudFlare spotted a new dangerous botnet
Security experts from CloudFlare observed a new botnet that emerged in the wild and it could be dangerous as its predecessor Mirai. Which is the most dreaded botnet in theRead More →
Security experts from CloudFlare observed a new botnet that emerged in the wild and it could be dangerous as its predecessor Mirai. Which is the most dreaded botnet in theRead More →
xHamster is a free porn website and does not need details of credit or debit cards. If you are one of those who subscribed to the famous adult entertainment websitesRead More →
Since a full proof of concept for CVE-2016-0189 vulnerability was published on GitHub, Zscaler ThreatLabZ has been closely tracking its proliferation. The first copying of the exploit code we spottedRead More →
According to the FSB unnamed foreign hackers are planning to undermine Russian Banks with cyber attacks and PSYOPS via social media. The Kremlin is accusing unnamed foreign hackers of plottingRead More →
Two researchers have found a way to bypass the Apple Activation Lock on both iPhones and iPads, running the two most recent versions of iOS, 10.1 and 10.1.1. If you’reRead More →
Scientists and medical professionals published a research paper in which they detailed a simple and inexpensive approach to creating a device that can be used to hack Implantable Cardiac DefibrillatorsRead More →
Only real defense for billions of devices is physically capping ports. Last year we wrote about the “USB Killer”—a DIY USB stick that fried almost everything (laptops, smartphones, consoles, cars) thatRead More →
Symantec plays part in takedown of the Avalanche malware-hosting network. The Avalanche malware-hosting network has been dealt a severe blow following the takedown of infrastructure used by at least 17Read More →
As of December 1, 2016, US law enforcement has gained new hacking powers thanks to changes to Rule 41 of the Federal Rules of Criminal Procedure that now simplify theRead More →
For six months, the remote management app has opened users to code-execution attacks. For at least the past six months, a popular remote management app available in the official GoogleRead More →
Hacking Global Positioning System with GPS ‘Spoofing’ Can Lead To Fatalities. Imagine you are relying on Google Maps and suddenly it leads you to an unwanted/dangerous place. Up to nowRead More →
Critical code-execution flaw resides in Windows, Mac, and Linux. Patch now. Developers with both Mozilla and Tor have published browser updates that patch a critical Firefox vulnerability being actively exploitedRead More →
No data stolen and the lottery is unaffected, officials says. “Hackers managed to break into the UK National Lottery, accessing no less than 26,500 accounts and making changes to someRead More →
Recently, we discovered a new Google Android Trojan named “PluginPhantom”, which steals many types of user information including: files, location data, contacts and Wi-Fi information. It also takes pictures, capturesRead More →
As a result of a lot of hard work done by our security research teams, we revealed today a new and alarming malware campaign. The attack campaign, named Gooligan, breachedRead More →
A new multi-functional malware family detected as Proteus can transform the computers of infected users in proxy servers, can mine for various types of crypto-currencies, can log keystrokes, and checkRead More →
864 cases this year in the UK; true figure is likely much higher. The number of reported webcam blackmail cases has more than doubled in the past year, and atRead More →
Security expert discovers flaw in Windows 10 in-place upgrade system that gives hackers admin rights. Getting administrator privileges on a Windows 10 computer no longer requires complex tactics and malware,Read More →
Benjamin Dumke-von der Ehe found an interesting way to steal data cross domain. Using JS proxies he was able to create a handler that could steal undefined JavaScript variables. ThisRead More →
Publicly released exploit works reliably against a wide range of Firefox versions. There’s a zero-day exploit in the wild that’s being used to execute malicious code on the computers ofRead More →