macOS bug lets you log in as admin with no password required
Here’s how to protect yourself until Apple patches bafflingly bad bug. In one of Apple’s biggest security blunders in years, a bug in macOS High Sierra allows untrusted users toRead More →
Here’s how to protect yourself until Apple patches bafflingly bad bug. In one of Apple’s biggest security blunders in years, a bug in macOS High Sierra allows untrusted users toRead More →
The Google Play Store is a little more open than its competition, such as the iOS App Store. With the uploading of applications being so cheap, a free SDK toRead More →
We’ve been following the Terror exploit kit during the past few months and observed notable changes in both its redirection mechanism and infrastructure, which have made capturing it in theRead More →
The accused hacked 3 multinational corporations in pursuit of intellectual property. Three men who worked for an Internet security firm in China have been indicted on federal charges for hackingRead More →
Qihoo 360 Netlab researchers reported on Friday that they are tracking an uptick in botnet activity associated with a variant of Mirai. Targeted are ports 23 and 2323 on internet-connectedRead More →
Delete any Image on Facebook When I was checking out facebook’s new features, I noticed that polling feature were added to the posts so I start working onRead More →
Earlier this month, we reported how a Muslim hacking collective named Di5s3nSi0N was able to hack Amaq, one of the key outlets for ISIS propaganda, within hours after they called themselves “unhackable.”Read More →
Imgur, a widely recognized image sharing service most commonly used on Reddit, has revealed that it suffered a data breach as far back as 2014, and claims that it wasRead More →
Researchers at CyberArk Labs have created a post-intrusion attack technique known as a Golden SAML that could allow an attacker to fake enterprise user identities and forge authentication to gainRead More →
Mac malware, Proton, is spreading through a legitimate security company. Security researchers spotted criminals using search poisoning to get more targets and leverage the credibility of Symantec in the industry.Read More →