Security

Sophisticated Google Drive Phishing Scam is becoming popular

Security experts at Symantec have discovered a new phishing scheme based on Google Drive that is being used by hackers…

12 years ago

Microsoft hasn’t disclosed neither fixed a 4 months-old 0Day Internet Explorer 8 flaw

Zero Day Initiative website has disclosed a new zero-day Internet Explorer 8 vulnerability which was reported to Microsoft four months…

12 years ago

Outlook Android App stores emails in plain text on mobile

Researchers at Include Security discovered that the Outlook.com Android App leaves user email messages unprotected by default on the mobile…

12 years ago

Windows 8 banned by China for Government Computers

Chinese Authorities ban the use of Microsoft Windows 8 Operating System for Government Computers, the ban is not extended to…

12 years ago

How to hack PayPal Manager and manage your Payflow account

Mark Litchfield, Security expert at Securatary, has published a proof of concept on the way it is possible to hack…

12 years ago

Who and how is using forged SSL certificates worldwide?

Who is abusing of forged SSL certificates in MITM attacks worldwide? A team of researchers implemented a new detection technique…

12 years ago

Multiple Security Misconfiguration in Juniper Online Service’s Lead to Expose Sensitive data

Security researcher Mohammed Saeed has Identified Multiple Security Misconfiguration in Juniper Online Service’s Lead to Expose Sensitive data and much…

12 years ago

Check Point Security Report 2014 – Malware in the enterprise

Check Point 2014 Security Report shows major security events occurred in 2013 show and provides useful information on current malware…

12 years ago

AirChat project supported by Anonymous to secure communications

Entities claiming to be part of Anonymous collective are working to put together a secure communications project named Airchat based on…

12 years ago

US DoJ proposal legalizes secret hacking for federal agencies

US DoJ formalized a proposal to allow U.S Federal Agencies to secretly hack suspects' computers to collect criminal evidence into…

12 years ago

This website uses cookies.