Breaking News

Cheap DDoS for Hire services discovered on a Freelancer-finding site

Incapsula experts Igal Zeifman and Dan Breslaw unmasked the availability of stresser and booter DDoS services on Fiverr website at…

10 years ago

Creators of the Nuclear EK are gaining nearly 100K USD each month

According to security experts at Check Point the creators of the Nuclear EK are gaining nearly 100K USD each month,…

10 years ago

Next-gen Tor is arriving and it will include a distributed random number generator

The researchers at the Tor project are working on a new distributed random number generator that will be included in…

10 years ago

Hacker Interviews – Speaking with Samy Kamkar

Today I want to share you my interview with one of the greatest white hat hackers in the IT Security…

10 years ago

LinkedIn breach from 2012 still haunting the security community

A data breach suffered by LinkedIn back in 2012 is still haunting the security community. In 2012, LinkedIn suffered an…

10 years ago

DMA Locker Ransomware has been significantly improved

Malware authors behind the DMA Locker ransomware have improved the threat is a significant way, now it is ready for…

10 years ago

Pastejacking attack relies on your clipboard as an attack vector

The Pastejacking Attack exploits JavaScript to override the clipboard content and trick victims into running malicious code. The security expert…

10 years ago

Android will replace passwords with trust scores by 2017

Daniel Kaufman announced that Google is planning to make password identifications outmoded by 2017 and replace them with trust scores.…

10 years ago

What is a SOC (Security Operations Center)?

What is a SOC? What is its mission? Which are the Security tools and technology components of a SOC? Here…

10 years ago

FBI warns of KeySweeper keystroke loggers disguised as USB phone chargers

The FBI issued a notification warning actors in the private sector about a rapid diffusion of KeySweeper, a keystroke loggers…

10 years ago

This website uses cookies.