Security

China replies to Hong Kong protests with spyware, MITM and censorship

Security experts speculate that the Chinese government is using mobile spyware, MITM attacks and Internet monitoring to control Hong Kong…

11 years ago

DARPA ASOM technology identifies counterfeit microelectronics

DARPA announced the deployment of the ASOM technology which will be used to inspect critical equipment to detect counterfeit microelectronics.…

11 years ago

Europol issued 2014 iOCTA report on evolution of cybercrime

The Europol issued 2014 Internet Organised Crime Threat Assessment (iOCTA) report to provide details about on-going developments in the cyber…

11 years ago

Apple released a patch for the Shellshock vulnerability

Apple has just released its patch for the Shellshock vulnerability. The company provided an update for the OS X Lion,…

11 years ago

A mobile spyware used to track activists in Honk Kong

A Fake Occupy Central app containing a spyware is used by unknown to track activists in Hong Kong. Evidences suggest…

11 years ago

SHA-1 has been deprecated, what can I do?

The SHA-1 cryptographic hash algorithm has been known vulnerable, Collision attacks against it are too affordable and attacks will get…

11 years ago

ShellShock could be used to hack VoIP systems

Jaime Blasco at AlienVault Labs explained that ShellShock vulnerability could be  exploited to hack Voice over IP systems worldwide. The…

11 years ago

The majority Mac users safe from Bash Bug while Oracle warns its customers

Apple says users of its OS X are "safe by default" from the Bash Bug, meanwhile Oracle warns its customers…

11 years ago

The Fappening 3, other nude celebrity photos leaked

A new collection of photos belonging to the Fappening archives have been leaked online, it includes nudes of Jennifer Lawrence…

11 years ago

Spike botnet runs DDoS attacks from IoT devices

Experts at Akamai spotted a new malware kit named Spike which is used by bad actors to run DDoS attacks…

11 years ago

This website uses cookies.