Security

Seaduke, another weapon in the Duke arsenal

Security researchers at Symantec have analyzed Seaduke, a sophisticated Trojan used by threat actors behind the “Duke” malware family. Security…

11 years ago

Hacking Team supported Italian Special Operations Group with BGP Routing Hijack

Documents leaked online after the Hacking Team hack revealed how the Italian firm supported the Italian Special Operations Group with…

11 years ago

A new Zero-Day Vulnerability arises from Hacking Team hack

Security Researchers at Trend Micro have discovered a second Zero-Day Vulnerability that arises from Hacking Team cyber attack. Just Three…

11 years ago

Security Affairs newsletter Round 17 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

11 years ago

UK to ban messaging applications under a new law

In the UK hard times for messaging applications like WhatsApp and Facebook Messenger, the Investigatory Powers Bill, probably will pass…

11 years ago

OpenSSL fixes Alternative chains certificate forgery flaw

OpenSSL Foundation fixed a critical issue that impacts any application that uses the popular crypto library in the authentication processes.…

11 years ago

Shodan, the Google of the Internet of Things

Google finds websites meanwhile Shodan finds devices exposed on the web, including Internet of Things devices, that's why hackers love…

11 years ago

NYSE, United Airlines, WSJ contemporary down, cyber attacks or incidents?

Trading was halted for more than two hours on the NYSE floor, contemporary United Airlines system and the Wall Street…

11 years ago

Hackers’ capability to crash trains raises security concerns, malware could lead to train crashes in the UK

Cyber attacks can crash trains. Intense security concerns have emerged, after the upgrade of the British railway network that can…

11 years ago

Traffic in Tor network is being sniffed in the exit nodes

A security researcher conducted an experiment to demonstrate that someone is sniffing passing traffic from Tor network exit nodes. When…

11 years ago

This website uses cookies.