Login duplication allows 20m Alibaba accounts to be attacked
The reuse of login details on Alibaba’s Taobao has allowed an attack on 5 percent of the accounts on Alibaba’s Chinese retail sites. Hackers in China have attempted to accessRead More →
The reuse of login details on Alibaba’s Taobao has allowed an attack on 5 percent of the accounts on Alibaba’s Chinese retail sites. Hackers in China have attempted to accessRead More →
Dell and Cylance join the fight against bootkits. Dell has announced a partnership with Cylance, which will add a new security layer for its line of motherboards, a BIOS integrity verificationRead More →
In this tutorial, we will explore where and what the forensic investigator can find information about the activities of the suspect in their web browser. It’s important to note thatRead More →
FOR THE LAST three years, the evolution of firearms has been playing out all over again in plastic form: Deadly, working guns that anyone can generate with a download andRead More →
Backdoor code was committed by a former Oracle employee. Developers of Socat, a *NIX-based networking utility, have discovered and patched a security bug affecting its encryption capabilities and that weakened theRead More →
Short Bytes: The Dark Web is the World Wide Web content that exists in the darkness. The Dark Web consists of networks which use the public Internet but require specificRead More →
Short Bytes: In a video found on the YouTube channel of Samy Kamkar, a USB drive beaded in a necklace has been shown which is capable of doing some really dangerousRead More →
DMA Locker is another ransomware that appeared at the beginning of this year. For now it has been observed to be active only on a small scale (source) – butRead More →
The Comodo app also replaces links and hijacks DNS. Developers have exposed the fact that Comodo Internet Security is actually a security threat for anyone using it. It’s using a reallyRead More →
For our most recent IoT adventure, we’ve examined an outdoor cloud security camera which like many devices of its generation a) has an associated mobile app b) is quick toRead More →
Wikileaks founder Julain Assange can be a free man this Friday — His fate depends on the decision from United Nation’s Working Group on Arbitrary Detention (WGAD). Julian Assange, Wikileaks founderRead More →
JSF**k JavaScript library abused to deliver malware. Security researchers have alerted eBay’s staff about a vulnerability in its online platform that lets attackers launch phishing sites and push malware toRead More →
Twenty years ago, the first Word macro malware spread across the planet. Embedded inside a Word document, and rather unhelpfully given a kick start by being shipped on a MicrosoftRead More →
Microsoft has been accused of pushing Windows 10 rather aggressively, and the company’s latest move is going to do nothing to silence these accusations. For Windows 7 and Windows 8.1Read More →
Anonsec group hacked NASA network and released a data dump of data online. The hackers also hijacked a Global Hawk drone. Hackers belonging to the AnonSec group have released online 250GBRead More →
JUST WHEN THE Silk Road’s saga of dirty money and double-dealing seemed to be winding down, one of the federal agents who investigated the site has added an audacious footnote:Read More →
A multi-billion U.S. Dollar firewall run by the Department of Homeland Security meant to detect and prevent nation-state hacks against the government functions ineffectively, according to a sanitized version ofRead More →
Security experts at FireEye are warning attackers can exploit the JSPatch hot patching technique to serve malicious code and put iOS users at risk. The release of hot patches forRead More →
Unprotected HP printer HDDs can be abused if not protected. Security researcher Chris Vickery has discovered that HP LaserJet printers may be abused as an anonymous data storage unit by maliciousRead More →
Short Bytes: According to the latest documents provided by Edward Snowden to The Intercept, NSA and GCHQ were involved in surveillance activities pertaining to Israeli and Syrian drones presumed toRead More →