Hacking

Cisco warns of the availability of public exploit code for critical flaws in Cisco Small Business switches

Cisco provided updates for security advisories for three flaws affecting Cisco Small Business 220 Series Smart Switches patched in early…

6 years ago

The Dangers of Using Unsecured Wi-Fi Networks

Isn’t public Wi-Fi great? If you’re having a tea or coffee in a cafe or restaurant you can check your…

6 years ago

Texas attackers demand $2.5 million to allow towns to access encrypted data

Crooks behind the attacks against Texas governments are now demanding $2.5 million to allow victims to access encrypted data. The…

6 years ago

A new Zero-Day in Steam client impacts over 96 million Windows users

A new zero-day vulnerability in the for Windows impacting over 96 million users was disclosed by researcher Vasily Kravets. A news…

6 years ago

DoS attacks against most used default Tor bridges could be very cheap

Researchers explained that carrying out attacks against the most used default Tor bridges would cost threat actors $17,000 per month.…

6 years ago

The Cost of Dealing With a Cybersecurity Attack in These 4 Industries

A cybersecurity issue can cause unexpected costs in several different areas, which is the cost of Dealing with an attack…

6 years ago

Damage from Silence APT operations increases fivefold. The gang deploys new tools on its “worldwide tour”

Experts from Group-Ib that exposed the most recent campaigns carried out by Silence reported that damage from the APT group…

6 years ago

A backdoor mechanism found in tens of Ruby libraries

Maintainers of the RubyGems package repository have removed 18 malicious versions of 11 Ruby libraries that contained a backdoor. Maintainers…

6 years ago

Flaw in New Facebook Design Allowed Removal of Profile Photos

A security vulnerability in the Facebook design (FB5) could have allowed attackers to remove any photo from profiles of the…

6 years ago

5 Ways to Protect Yourself from IP Address Hacking

Your IP address represents your digital identity online, hacking it not only allows attackers to access your device or your…

6 years ago

This website uses cookies.