Security

Who is spying on Tor network exit nodes from Russia?

Researchers Winter and Lindskog identified 25 nodes of Tor network that tampered with web traffic, decrypted the traffic, or censored…

12 years ago

Weak passwords, in 2013 it is still a frequent error

SplashData has issued its Annual “25 Worst Passwords of the Year” enumerating the list of the most common password chosen…

12 years ago

SERT Q4 2013 Threat Intelligence Report on threat landscape evolution

Solutionary security firm published SERT Q4 2013 Threat Intelligence Report to provide an overview of the overall threat landscape. Recently…

12 years ago

South Korea, 20 Million credit card data has been leaked

Financial Supervisory Service confirmed that Stolen credit card data of at least 20 million bank and credit card users in…

12 years ago

VPN vulnerability in Android devices allows intercept communications

Israeli Security researchers discovered an Android security flaw to bypass active VPN configurations and intercept secure communications. A new alleged…

12 years ago

ReVuln team founds a zero-day in SCADA component

At S4x14 Conference in Miami, a researcher at of ReVuln disclosed a buffer overflow zero-day flaw in HMI software produced…

12 years ago

10 million Starbucks customers at risk for official iOS app flaw

Security researcher Daniel E. Wood discovered a vulnerability in the Starbucks official iOS app related to the insecure storage of…

12 years ago

An increasing number of targeted attacks against the energy sector

Symantec published in the report titled "Targeted Attacks Against the Energy Sector" to describe the security landscape for companies of…

12 years ago

Kaspersky discovered Icefog Hit US energy companies with Java Backdoor

Kaspersky experts discovered a java version of icefog espionage campaign that targeted at least 3 us oil, gas companies spreading…

12 years ago

Internet of Things and principal cyber threats

Internet of Things, a business growing at a compound annual rate of 7,9%, which are the principal cyber threats to…

12 years ago

This website uses cookies.