New banking Scam: ATM HIJACKING
Cybercrime is always evolving to try to find the best way to get resources illegally. Specialists from IT security courses report a new variant of banking fraud in which, insteadRead More →
Cybercrime is always evolving to try to find the best way to get resources illegally. Specialists from IT security courses report a new variant of banking fraud in which, insteadRead More →
Specialists from an information security training course report the finding of a critical vulnerability in version 5.2.1 of TinyMCE, the popular What-You-See-Is-What-You-Get (WYSIWYG) text editor for open source HTML thatRead More →
The development of a jailbreak for iOS systems has become one of the biggest ambitions of users of Apple devices. According to specialists in an ethical hacking course, Twitter userRead More →
The Android operating system has been characterized by its almost unlimited capacity for customization, in large part thanks to its Linux kernel and its open source nature, mention specialists inRead More →
Specialists from a pentesting course have revealed the finding of a critical flaw in PAN-OS, the operating system present in multiple Palo Alto Networks solutions. According to the report, theRead More →
Everyone agrees that spam is one of the most hated things by tech users. No matter how many times we empty the undesirable mail folder, it will be full againRead More →
Phone fraud has more and more variants and more complex resources, specialists from a cyber security consulting company report. A few days ago a reporter recounted how he contacted aRead More →
The Southeastern Philadelphia Transportation Authority (SEPTA) has confirmed the detection of a malware attack on its servers. According to pentesting course specialists, the incident has prevented SEPTA from sharing relevantRead More →
Security threats against telecommunication systems remain a serious problem, specialists in an exploit writing course say. Voice over LTE (VoLTE) packet-based telephony service, integrated into the Long Term Evolution (LTE)Read More →
Sometimes the most sophisticated technological developments depend on outdated technology, mention experts in a pentesting course. After a group of Pen Test Partners researchers analyzed an abandoned Boeing 747-400 aircraft,Read More →