Breaking News

Risks of hacking attacks: Ransomware – Cryptolocker and tutorials for Italian SMEs in the light of the Network and Information Security (NIS) Directive.

As was anticipated by Minister Pier Carlo Padoan, the Taormina G7, he would have to face, inter alia, the overwhelming…

9 years ago

AV-TEST: The number of malware decreases, but their complexity increases

According to the AV-TEST Security Report 2016/2017 published by the independent anti-virus testing outfit AV-TEST, the number of malware decreases, but ...…

9 years ago

Ukrainian cyberpolice seized MeDoc servers while hackers withdrawn Bitcoin from NotPetya wallet

The Ukraine's cyber police seized the MeDoc servers after detecting a new suspicious activity and fearing new malware-based attacks. The Ukrainian…

9 years ago

Bithumb, the fourth largest Bitcoin exchange has been hacked

Bithumb, one of the world's largest Bitcoin and Ether crypto currencies exchanges, has been hacked. Over $1 Million worth Bitcoin and…

9 years ago

Why AA didn’t inform customers after a massive data leak

A backup containing sensitive information on more than 100,000 AA customers was exposed online, but the company didn't disclose the…

9 years ago

Vulnerabilities in Pre-Installed Software expose Dell Systems to hack

According to experts from Talos, security vulnerabilities in pre-installed software expose Dell systems to code execution attacks. Security vulnerabilities in…

9 years ago

Hacker Interview Mubix “Rob” Fuller – Security Affairs

Today I have the pleasure to interview Mubix “Rob” Fuller (@mubix ) one of the most prominent experts in the hacking…

9 years ago

Security researchers Crack 1024-bit RSA Encryption in GnuPG Crypto Library

Experts have devised a side-channel attack on RSA secret keys that allowed to crack 1024-bit RSA Encryption in GnuPG Crypto Library. Security…

9 years ago

A fresh massive AdGholas Malvertising campaign infects millions

Researchers at Proofpoint discovered a massive AdGholas Malvertising Campaign infecting as many as 1 million computers per day with several…

9 years ago

How to chain flaws in Lenovo VIBE smartphones to gain root privileges

Researchers from Mandiant found a way to gain root privileges on Lenovo VIBE smartphones by chaining three vulnerabilities. The Lenovo…

9 years ago

This website uses cookies.