Three serious Linux kernel security holes patched
It’s time to patch your Linux servers and PCs again. The good news is developers are looking very closely at Linux’s core code for possible security holes. The bad newsRead More →
It’s time to patch your Linux servers and PCs again. The good news is developers are looking very closely at Linux’s core code for possible security holes. The bad newsRead More →
Experts at the Nuclear Industry Summit (NIT) explained how to reduce the risk of damaging cyberattacks at nuclear facilities. The threat of cyber attacks on nuclear power plants and otherRead More →
The United States Computer Emergency Readiness Team (US-CERT), an organization within the Department of Homeland Security (DHS), has published a security alert yesterday, warning owners of Netgear R6400 and R7000Read More →
State election official bungles the case that DHS tried to breach his office. Accusations that the US Department of Homeland security tried to hack Georgia’s voter registration database are runningRead More →
Malware coders are advertising a new Android trojan that can be used for phishing banking credentials, intercepting SMS messages, locking devices with a password (ransomware-like behavior), and more. The trojan’sRead More →
One of the hackers who amassed a new massive army of zombie internet-connected devices that can launch disruptive cyberattacks—even by mistake—now claims to have taken control of 3.2 million homeRead More →
The Finnish security expert Jouko Pynnönen discovered a vulnerability in the Yahoo email service that allowed hackers to read anyone messages. A vulnerability in the Yahoo email service allowed hackersRead More →
A group of malware authors has come up with a new method of transcending an infection from the user’s computer to his Android smartphone. Discovered by security researchers from BadCyberLabs,Read More →
wrote-password-cracking-manual. Password cracking has always been this niche activity during a routine pentest. You collect some hashes, fire up John The Ripper or Hashcat, and use default settings with rulesRead More →
Spammers are mass-messaging Facebook users with PDF files claiming to contain nude celebrity pictures, but which lead users to a malicious Chrome extension and overly aggressive advertising sites. This spamRead More →