Hackers sell Apple ID in the Dark Web for 15 USD
Apple is once again present for non-positive issues. Recently there were articles where companies claimed to have managed to find a way to unlock any iPhone. Today news report thatRead More →
Apple is once again present for non-positive issues. Recently there were articles where companies claimed to have managed to find a way to unlock any iPhone. Today news report thatRead More →
The vulnerability in Memcached Servers has been exposed to the masses since its proof of concept (PoC) code was recently published online. That exposure would now allow script kiddies toRead More →
Hackers hit over 1,400 Apache Solr servers at the end of February to install a cryptocurrency miner. According to information security training researcher Renato Marinho, the Apache Solr attackers are using theRead More →
Thanks to Microsoft who a few months ago vowed to bring open source software to its store, now you can download Kali Linux and install it on Windows 10 KaliRead More →
The widely distributed Gozi ISFB banking Trojan has a new trick up its sleeve; it has been making use of the evasive Dark Cloud botnet for distribution in a seriesRead More →
The Memcached vulnerability has been used in record-breaking DDoS attacks. Various proof-of-concept scripts have been released to exploit the vulnerability. Hackers have recently been exploiting a vulnerability in the MemcachedRead More →
As per ongoing investigation of an information security training firm, a stolen external hard drive has led to the personal information of more than 15,000 people formerly and currently associated with CaliforniaRead More →
Mac users are often told that they don’t need antivirus software, because there are no Mac viruses. However, this is not true at all, as Macs actually are affected byRead More →
Researchers find 150 Ramnit-infected apps a year after a similar batch was discovered. Last year, researchers discovered 132 Android apps in the Google Play market that lamely attempted to infect users with… WindowsRead More →
A loophole in Facebook’s advertising targeting mechanism could have let attackers obtain users’ phone numbers after they visited websites the attackers controlled, a group of information security training professionals revealedRead More →