Security

US Ports – Cyber attacks can cause the release of dangerous chemicals

US Ports are still vulnerable to cyber attacks that release dangerous chemicals, cybersecurity in the maritime industry is crucial for…

10 years ago

Apple has several apps from the official iOS App Store

Apple has removed mobile apps from the iOS Apple store that are installing root CA certificates that enable traffic to…

10 years ago

Cost of Breaking SHA-1 decreases due to a new Collision Attack

A group of researchers has demonstrated that the cost of breaking the SHA-1 hash algorithm is lower than previously estimated.…

10 years ago

Bad actors target entities worldwide via Cisco WebVPN

Experts at Volexity discovered a hacking campaign targeting the CISCO WebVPN VPN product, attackers aim to steal corporate login credentials.…

10 years ago

Iranian Cleaver hackers exploit LinkedIn for cyber espionage

The Cleaver group is once again in the headlines managing a well-developed network of fake LinkedIn profiles for cyber espionage…

10 years ago

Researcher claims Microsoft CID exposed in plain text

Microsoft web applications, such as Outlook or OneDrive and account pages, expose visitors’ Microsoft Identifier (CID) in plain text. A…

10 years ago

Hacking enterprise wireless Printers with a drone or a vacuum cleaner

A group of researchers from the iTrust has demonstrated how to use a Drone to intercept wireless printer transmissions from…

10 years ago

The Angler Exploit Kit Exposed: Making $60 Million Annually by Delivering Ransomware

The Cisco Talos Group has performed in-depth research on the threat actors behind the Angler Exploit Kit, and even had…

10 years ago

Civil nuclear facilities worldwide at risk of cyber attack

The nuclear industry is still unprepared to respond cyberattacks exposing civil nuclear facilities worldwide at risk of cyber attacks. Civil…

10 years ago

AV-Test – Which is the best Antivirus for Linux systems?

The Independent AV-Test Institute has analyzed 16 Linux security solutions against Windows and Linux threats under Ubuntu. The results are…

10 years ago

This website uses cookies.