Security

US Army Experts Call for military bug bounty program AVRP

US Army Military experts urge the establishment of an Army Vulnerability Response Program (AVRP),  a sort of military bug bounty…

10 years ago

The cyber labor market in Israel, the cyber guild

In Israel there is an advanced cyber security industry, based mostly on veterans from two intelligence units, the cyber labor…

10 years ago

Google hacker Forshaw’ verdict about Windows 10

The Google Project Zero hacker  James Forshaw assessed Windows 10 analyzing the big risks related with the new OS from…

10 years ago

Mikko Hyppönen warns the ISIS has a credible offensive cyber capability

Cyber Security Expert Mikko Hyppönen worries about cyber terrorists belonging to the Islamic State (ISIL or ISIS) have a credible…

10 years ago

Alleged LulzSec member claims responsibility for the DDoS on TalkTalk

A hacker belonging to the alleged group LulzSec has claimed responsibility for a DDoS attack that hit UK telecom TalkTalk…

10 years ago

How to improve Internet security after the disclosure of the Diffie-Hellman flaw

Now that it is known a critical flaw in the Diffie-Hellman key-exchange protocol was exploited by the NSA to break…

10 years ago

New Joomla release patches a serious SQLi flaw

Joomla just released a patch to fix a critical vulnerability that can allow an attacker to get full administrative access…

10 years ago

Crooks are hacking CCTV Cameras to launch severe DDoS attacks

Imperva has discovered that attackers hijack CCTV cameras to launch powerful DDoS attacks exploiting weak credentials and poor configurations of…

10 years ago

74% organizations think they will be hit by an APT in the near future

The ISACA study "2015 Advanced Persistent Threat Awareness-Third Annual" tries to uncover information security professionals’ understanding of APT threats. A…

10 years ago

Network Time Protocol flaws can cause chaos on a global scale

Serious flaws in the Network Time Protocol can be exploited to cause severe outages, eavesdrop encrypted communications, bypass authentication processes.…

10 years ago

This website uses cookies.