Security

Reflection DDoS Attacks Continue to be dangerous in Q3 2014

The last report issued by Arbor ATLAS Shows an increase in Reflection DDoS Attacks in Q3 2014, specifically for SSDP…

11 years ago

Reflections on Bash Bug case and evolution of IT security landscape

Security expert Boris Mutina made an analysis of IT Security landscape, highlighting critical trends and suggesting a proactive approach to…

11 years ago

DREBIN Android app detects 94 percent of mobile malware

A team of German researchers developed an innovative Android app dubbed DREBIN capable of detecting 94 percent of mobile malware.…

11 years ago

P2P payment feature hidden in Facebook Messenger

The student Andrew Aude discovered a still unreleased feature for payments of Facebook Messenger by using the iOS and Mac…

11 years ago

Northern Gold criminal gang infected half million PCs worldwide

Proofpoint firm uncovered a malicious campaign run by the Northern Gold criminal group which is targeting online banking users with…

11 years ago

UPDATE – Bugzilla Zero-Day could trigger another Internet earthquake

A zero-day in Bugzilla bug-tracking tool allows anyone to view detailed reports about unfixed vulnerabilities in a wide range of…

11 years ago

Bash bug and risks posed by incomplete patches, discovered other two additional bugs

The security researcher Michal Zalewski revealed the details of other two additional bugs he discovered in the Bourne Again Shell…

11 years ago

How to transform USB sticks into an undetectable malicious devices

Two researchers Brandon Wilson and Adam Caudill released their attack code to reprogram USB sticks and use them as an…

11 years ago

Signed CryptoWall ransomware distributed via top websites

A digitally signed version of the popular CryptoWall ransomware is distributed via five Alexa top-ranked websites in a widespread malvertising…

11 years ago

China replies to Hong Kong protests with spyware, MITM and censorship

Security experts speculate that the Chinese government is using mobile spyware, MITM attacks and Internet monitoring to control Hong Kong…

11 years ago

This website uses cookies.