Breaking News

Police seized two Tor relays investigating WannaCry attack, others disappeared in the same periodPolice seized two Tor relays investigating WannaCry attack, others disappeared in the same period

Police seized two Tor relays investigating WannaCry attack, others disappeared in the same period

France’s cyber-crime investigation unit OCLCTIC seized one server running two Tor Relays Investigating the WannaCry attack. A few days after…

8 years ago
Critical kernel command line injection flaw found in Motorola handsets MOTO G4, G5Critical kernel command line injection flaw found in Motorola handsets MOTO G4, G5

Critical kernel command line injection flaw found in Motorola handsets MOTO G4, G5

Security experts have discovered a critical kernel command line injection vulnerability in the Motorola handsets Moto G4 and Moto G5.…

8 years ago
Security Affairs newsletter Round 114 – News of the weekSecurity Affairs newsletter Round 114 – News of the week

Security Affairs newsletter Round 114 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. ·      Nexpose…

8 years ago
US Defense is working on new multifactor authentication systemsUS Defense is working on new multifactor authentication systems

US Defense is working on new multifactor authentication systems

DARPA is currently developing a multifactor authentication system that will replace the current common access card (CAC). According to a…

8 years ago
SambaCry is reality, crooks are abusing CVE-2017-7494 to spread minersSambaCry is reality, crooks are abusing CVE-2017-7494 to spread miners

SambaCry is reality, crooks are abusing CVE-2017-7494 to spread miners

Security experts from Kaspersky confirmed that threat actors in the wild are exploiting the SambaCry vulnerability CVE-2017-7494 to spread a…

8 years ago
Gamestop hacked. Financial data of online shoppers were accessed by crooksGamestop hacked. Financial data of online shoppers were accessed by crooks

Gamestop hacked. Financial data of online shoppers were accessed by crooks

Personal and financial information about Gamestop online shoppers could have been compromised in a breach occurred between Aug. 10, 2016 to…

8 years ago
Mouseover PowerPoint attack exploited to deliver the Gootkit TrojanMouseover PowerPoint attack exploited to deliver the Gootkit Trojan

Mouseover PowerPoint attack exploited to deliver the Gootkit Trojan

Experts at Trend Micro observed a spam campaign leveraging the PowerPoint 'Mouseover' attack to deliver the Gootkit banking Trojan. Earlier…

8 years ago
Hundred of thousands of IP Cameras Hijacked by Persirai and other thingbotsHundred of thousands of IP Cameras Hijacked by Persirai and other thingbots

Hundred of thousands of IP Cameras Hijacked by Persirai and other thingbots

Thousands of IP cameras have been hijacked by the Persirai IoT botnet that targets more than 1,000 IP camera models,…

8 years ago
CISCO Prime Data Center Network Manager affected by two critical flawsCISCO Prime Data Center Network Manager affected by two critical flaws

CISCO Prime Data Center Network Manager affected by two critical flaws

Cisco èiblished two security advisories to warn customers of the presence of two critical vulnerabilities in the CISCO Prime Data…

8 years ago
New Tor Browser 7.0 implements multiprocess mode, content sandbox, and Unix domain socketsNew Tor Browser 7.0 implements multiprocess mode, content sandbox, and Unix domain sockets

New Tor Browser 7.0 implements multiprocess mode, content sandbox, and Unix domain sockets

The Tor Project Team has announced the release of Tor Browser 7.0, it comes with multiprocess mode, content sandbox, and…

8 years ago