Technion students Find a security vulnerability in the Internet DNS protocol which allows the attackers to redirect users to a…
Expert at Trustwave explained the tactics adopted by cyber criminals how to serve malware in phishing attacks exploiting .lnk files.…
Hit and Run DDoS attacks are composed by a series of short bursts of high volume attacks, having a limited…
Security Experts at PhishLabs revealed that a vishing campaign targeted banking industry to harvest credit/debit card data from customers. The…
Security Experts at Symantec discovered scammers are exploiting Facebook users' intention to hack friends' account to compromise their profile. Symantec…
Security experts Cesar Cerrudo conducted a study on the security of components within control traffic lights and similar electronic systems.…
AOL Inc. confirms security breach, email accounts of a significant number users may have been exposed, no financial data has…
Romanian Researcher discovered that Skype application store sensitive User Data Unencrypted on a local database. A Romanian programmer at Hackyard Security Group, Dragoş Gaftoneanu,…
Adobe has just released a security updates for Flash Player to fix critical vulnerabilities that are being exploited by hackers…
TrendMicro has published an excellent study on the evolution of the Russian underground, detailing products, services and related prices. Max…
This website uses cookies.