Black Hat SEO Campaign Leverages SQL Injections to Boost Search Rankings
A new type of black hat SEO campaign has been uncovered in the last few months by Akamai’s experts, who have observed that an attacker is using SQL injection flawsRead More →
A new type of black hat SEO campaign has been uncovered in the last few months by Akamai’s experts, who have observed that an attacker is using SQL injection flawsRead More →
A mobile banking trojan just evolved, and while security researchers are quite impressed by the malware author’s ingenuity, us users aren’t that happy to find out that voice-based two-factor authenticationRead More →
Fortinet’s FortiOS operating system, deployed on the company’s FortiGate firewall networking equipment includes an SSH backdoor on versions from the 4.x series up to and including 4.3.16, and the 5.xRead More →
Intel acknowledges that Skylake processors freeze in the middle of work. A bug has been found in the Intel processors that can freeze any system confirms Intel. Dubbed as Skylake, theRead More →
Security experts at Heimdal Security are warning a spike in cyber attacks leveraging the popular Neutrino and RIG exploit kit. Cyber criminals always exploit new opportunities and users’ bad habits, nowRead More →
A critical bug on eBay’s website opened the door for malicious hackers to create fake login pages to steal passwords and harvest credentials. An independent security researcher found the flawRead More →
A new type of RAT (Remote Access Trojan) has been discovered in use against governments and civil society organizations in South-East Asia, the Arbor Security Engineering & Response Team (ASERT)Read More →
CBS endangered cyber-procedural: Plane hacking! Software defined radio! White noise! OMG!. There are lots of cringeworthy technology moments on television, especially when the words “hacking” and “cyber” are introduced into theRead More →
Wearable devices can be used as motion-based keyloggers. French student and software engineer, Tony Beltramelli, has published his master thesis called Deep-Spying: Spying using Smartwatch and Deep Learning, in which heRead More →
API used a simple authentication scheme, exposing users to CSRF attacks that allowed third-parties to hijack accounts. Verizon fixed an issue in its My FiOS REST API that would haveRead More →
Netflix Hack : Here Is How To Open Up Movie Portals You Didn’t Know Existed. You probably know that Netflix is a online movie streaming website. As of October 2015, Netflix reportedRead More →
Researchers contradict Juniper claim that Dual_EC_DRBG weakness couldn’t be exploited. Juniper Networks, which last month made the startling announcement its NetScreen line of firewalls contained unauthorized code that can surreptitiouslyRead More →
Short Bytes: Kingston Digital, one of the world leaders in memory products, has released DataTraveler 2000 encrypted USB Flash drive. This portable memory device offers best-in-class security features like hardwareRead More →
The hacking group New World Hacking that claimed the responsibility for the BBC attack revealed that the DDoS attack reached the 602 GBps. On December 31th, the BBC website andRead More →
Russian ISP Eurobyte fails to answer Cisco’s emails, allows malvertising campaign to go on undisturbed. Cisco’s Talos research team has managed to identify and partially shut down a cyber-criminal group thatRead More →
When it comes to securing homes and businesses, a security camera is a privileged solution but it paradoxical is exposing users to further risks. A new study made by researchersRead More →
The TV cable and Internet service provider Time Warner Cable is warning customers their emails and passwords may have been exposed. Nearly 320,000 of the TV cable and Internet service providerRead More →
First major automaker (aside from Tesla) to issue guidelines promising not to sue researchers. On January 5, General Motors quietly flipped the switch on Detroit’s first public security vulnerability disclosureRead More →
Tech industry hits back at plans to create legal framework for hacking by spies, military and police. Tech companies including Apple, Microsoft, Google and Facebook have criticized plans by theRead More →
THE SO-CALLED DARK web, for all its notoriety as a haven for criminals and drug dealers, is slowly starting to look more and more like a more privacy-preserving mirror ofRead More →