Security

Security threat landscape in the Middle East … the mined cyber area

Analysis of the cyber threat landscape in the Middle East region provided by Tim Rains, director of Trustworthy Computing at…

12 years ago

How Coremex malware monetizes search engine Hijacking

F-Secure has identified a malware dubbed Coremex that takes advantage of plugin functionality provided by browsers to hijack search engine…

12 years ago

Researcher disclosed numerous security issues with Tesla S SmartCAR

A security researcher reported to Tesla company a series of security issues related with S model that could be exploited…

12 years ago

Chinese CCTV reported cases of pre-installed malware on Android mobile

Chinese TV station, CCTV, has reported some cases where smartphone were compromised by pre-installed malware before selling them on to unwitting…

12 years ago

RSA is accused again to have helped NSA to weaken security products

A group of researchers from Johns Hopkins University discovered that a second NSA tool aggravate the RSA security software's vulnerability.…

12 years ago

Chinese CNCERT report raises the alarm on attacks originated overseas

The last report issued by China’s Computer Emergency Response Team (CNCERT) blames US for the majority of malware based attacks…

12 years ago

Turkish Government is hijacking the IP for popular DNS providers

The Turkish Government ordered to Turk Telekom to hijack the IP address for popular free and open DNS providers such…

12 years ago

Philips SmartTV susceptible to serious hack according ReVuln experts

Researchers at ReVuln firm demonstrated how to exploit the last firmware update for Philips SmartTV to steal user's cookies and…

12 years ago

Reading the Global Threat Intelligence Report (GTIR)

The Global Threat Intelligence Report (GTIR) addresses the security challenges of organizations globally analyzing 3 billion worldwide attacks occurred in 2013.…

12 years ago

Google Transparency Report at first glance

Google has published its new Google Transparency Report related to the second semester of 2013, the number of requests for…

12 years ago

This website uses cookies.