Breaking News

OilRig campaign, Iran-Linked Hackers Target US Government & Energy Grid

OilRig campaign - An Iran-linked hacker group which previously targeted organizations in Saudi Arabia has now set its sights on…

9 years ago

More than 500,000 IoT devices potentially recruitable in the Mirai Botnet

Security experts have discovered more than 500,000 vulnerable Internet of Things (IoT) devices that could be potentially recruited in the…

9 years ago

Update X.Org libraries to avoid Privilege Escalation and DoS attacks

X.Org released patches and updates to fix several flaws found in many client libraries that could be exploited to cause…

9 years ago

Magecart campaign – Hackers target eCommerce sites with web-based keylogger injection attacks

Researchers have been monitoring a campaign dubbed Magecart that compromised many ecommerce websites to steal payment card and other sensitive…

9 years ago

New FastPoS PoS malware implements a ‘quickly and dirty’ approach to steal card data

The author of the FastPoS PoS malware issued an update that profoundly changes its behavior, preferring a quick exfiltration activity…

9 years ago

Expert developed a Mac malware that lies in wait for user to start video apps

Mac malware could spy on users by piggybacking on webcam sessions started by legitimate applications such as FaceTime, Skype and…

9 years ago

Which are principal cities hostages of malicious botnets?

Which are principal cities hostages of malicious botnets? Symantec has tried to reply the difficult questions with an interesting study.…

9 years ago

Yahoo – The Reuter’s article is misleading and the surveillance tool doesn’t exist

A few hours after the Reuters reported the existence of a surveillance tools used by Yahoo for email massive scanning,…

9 years ago

New Cerber ransomware variant kills common database-related processes

A new variant of the Cerber ransomware kills common database-related processes like those of the MySQL, Oracle and Microsoft SQL…

9 years ago

FBI arrested another NSA contractor involved in theft of secret documents

Once again an NSA contractor is the headlines for the alleged theft of secret exploit codes and highly confidential documents.…

9 years ago

This website uses cookies.