Security

Same Origin Method Execution attack to perform unintended actions on a website on behalf of victims

A researcher presented a new attack method dubbed Same Origin Method Execution which could be exploited to impersonate the targeted…

11 years ago

South Korea need to overhaul the national ID system

ID system of South Korea faces a significant overhaul in response to major data breaches occurred in the last years…

11 years ago

Microsoft Fixes 3 Zero-day and many other flaws being exploited in the Wild

Microsoft has released 8 security bulletins as part of October 2014 Patch Tuesday, it patches 3 Zero-day flaws actively being…

11 years ago

POODLE attack on SSL menaces Internet, it’s time to disable it by default

The POODLE against SSL 3.0. A new attack on SSL is threatening the Internet again, it allows bad actors to decrypt…

11 years ago

ICS-CERT states that manufacturing organization compromised for several months

Last ICS-CERT MONITOR report reveals that hackers had access to the systems of an unnamed manufacturing organization for several months.…

11 years ago

SandWorm hacking team exploited 0-day against NATO and other Government entities

iSIGHT Partners firm uncovered a Russian hacking team dubbed Sandworm that was running a cyber espionage campaign on NATO and…

11 years ago

WAAR report – Web Attacks continue to increase, especially those launched from Amazon servers

The WAAR report issued by Imperva states that Web Attacks increasingly launched from Amazon servers, the overall number of attacks…

11 years ago

Threat actors phishing for Intellectual property and source code from IT giants

FireEye CEO David DeWalt explained that threat actors are targeting IT giants for source code and highlighted the importance to…

11 years ago

Authentication vulnerability in PayPal mobile API allows access to restricted Accounts

An Authentication vulnerability in PayPal mobile API, discovered more than one year ago, allows access to restricted Accounts. Another authentication…

11 years ago

Leaked programming manual inspired development malware for ATMs

A document on NCR ATM API Documentation disclosed on Baidu may have helped criminals to develop malware used in the…

11 years ago

This website uses cookies.