Cyber Crime

Thousands of Magento websites compromised to serve malware

Security experts have discovered that thousands of websites running the eBay’s Magento e-commerce platform have been compromised and used to…

10 years ago

A young hacker violated the CIA Director’s private AOL email

A young hacker violated the CIA Director's personal email account and leaked sensitive files including a top-secret application for a…

10 years ago

WiFi jamming, too easy and cheap to run attacks

A security analyst has demonstrated that WiFi Jamming, such as the Jamming of Bluetooth and Zigbee systems, is very easy…

10 years ago

The Rapid Increase in the Sophistication of Exploit Kits

The prevalence and effectiveness of top exploit kits (Angler Exploit kit, Nuclear Exploit Kit) found to be very active in-the-wild.…

10 years ago

The ISIL is trying to hack American electrical power companies

US authorities confirmed that hackers belonging to the Islamic State (ISIL) are trying to hack American electrical power companies. According…

10 years ago

Russian Hackers suspected for the intrusion of Dow Jones systems

Bloomberg states that the ongoing investigation conducted by US authorities was probing allegations that there is a Russian gang behind…

10 years ago

McAfee study on the prices of stolen data on the Dark Web

McAfee Labs has analyzed a number of websites and services in the Dark Web used by the criminal communities for…

10 years ago

Critical Adobe Flash Zero-Day Vulnerability Actively Being Exploited In-the-Wild

Despite both Microsoft and Adobe releasing patches on Tuesday (10/13/2015), a critical Flash zero-day flaw remains unpatched in Adobe’s latest…

10 years ago

Customers of Japanese banks targeted by the Brolux Trojan

Researchers at ESET have spotted a new strain of banking Trojan dubbed Brolux that is targeting online banking users in…

10 years ago

5 Guidelines in Battling Cyber Criminals Over Precious Business Data

5 Guidelines in Battling Cyber Criminals Over Precious Business Data, lets's try to understand how to Ensure Enterprise Security. You…

10 years ago

This website uses cookies.