Security

Harvesting clients’ information from the utility company

A security expert explained how it is possible to hack the service provided by a utility company raising serious security…

11 years ago

Thamar Reservoir – Iranian hackers target entities in Middle East

Security experts at ClearSky have published a report on the a cyber espionage campaign dubbed Thamar Reservoir that is targeting…

11 years ago

US Schools use social media monitoring platform to protect students

Several US schools are using social media monitoring platform to watch students and their online activities in order to prevent…

11 years ago

Compromised SSH keys used to access popular GitHub repositories

Security experts Ben Cox explained that the official Github repositories of the UK Government, Spotify, and Python were accessed using…

11 years ago

Facebook positive step to use PGP for sending encrypted notification emails

Facebook users can add PGP keys to their profiles in order to receive "end-to-end" encrypted notification emails sent from Facebook.…

11 years ago

US financial industry moves under a rising wave of Cyberattacks and Zero-Day threats on I.R.S Tax Returns

US financial industry is under persistent attacks, the number of incidents that compromised confidentiality, integrity and availability of data are…

11 years ago

Security Affairs newsletter Round 11 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

11 years ago

The Importance of Operational Security and User Education

An overview of the principal issues related to the 3 general categories that security controls fall under; physical, technical, and…

11 years ago

Stegosploit hides malicious code in images, this is the future of online attacks

Stegosploit is the technique developed by the security researcher Saumil Shah that allows an attacker to embed executable JavaScript code…

11 years ago

Mandrake, NSA identifies users based on how they type on their devices

According to a senior fellow for Lockheed IT, the National Security Agency has tested the use of smartphone-swipe recognition technology…

11 years ago

This website uses cookies.