Hacking

NAT-PMP Protocol Vulnerability affects more than 1.2 Million SOHO devices

Security researchers at Rapid7 have discovered a serious NAT-PMP Protocol vulnerability that puts 1.2 Million SOHO routers at risk. Another…

11 years ago

Google improved 2-Step Verification with Security Key

Google has announced the introduction of an improved two-factor authentication mechanism based on a USB token dubbed Security Key. Google…

11 years ago

Operation Distributed Dragons, thousands of machine compromised worldwide

Operation Distributed Dragons - Tiger Security firm has discovered a series of DDoS attacks from China and that appear as…

11 years ago

Flaws in DTM components are threatening security of critical Industrial Control Systems

Researchers at the last Black Hat Europe have presented the results of their research on DTM/FDT components, demonstrating the presence…

11 years ago

Same Origin Method Execution attack to perform unintended actions on a website on behalf of victims

A researcher presented a new attack method dubbed Same Origin Method Execution which could be exploited to impersonate the targeted…

11 years ago

Security Companies united against the Hidden Lynx APT and its weapons

Principal security firms united in a joint effort dubbed Operation SMN against the cyber espionage group known as Hidden Lynx…

11 years ago

How to gain control of any Addthis user account

The security expert Federico Fazzi has disclosed a serious vulnerability in the Addthis.com service that allows attackers to take control…

11 years ago

Millions vulnerable UPnP devices vulnerable to attack

Researchers at Akamai firm have issued a report on reflection and amplification DDoS attacks exploiting vulnerable UPnP devices worldwide. Researchers…

11 years ago

Reflected File Download attack to spread 0-Day Worm Over Any Social Networks

A security expert defined a new attack technique dubbed Reflected File Download that allows to serve a 'Zero-Day' Worm without…

11 years ago

Threat actors phishing for Intellectual property and source code from IT giants

FireEye CEO David DeWalt explained that threat actors are targeting IT giants for source code and highlighted the importance to…

11 years ago

This website uses cookies.