Security

The fundamentals of Google Hacking

Rafael Souza (CISOof hackers online club) introduces the fundamentals of Google Hacking ABSTRACT Readers, I introduce a little about a…

12 years ago

Trend Micro detected AutoCAD Malware for long term cyber espionage

Security experts at Trend Micro detected a new variant of AutoCAD Malware that leaves victims hackable for further cyber attacks.…

12 years ago

Potentially Unwanted Programs secretly serve Bitcoin miner

Security experts at Malwarebytes discovered Potentially Unwanted Programs like Toolbars and Search Agents that installed Bitcoin miners on user's PC…

12 years ago

Israel and Saudi Arabia are plotting a cyber weapon worse than Stuxnet

Iranian report states that Israel and Saudi Arabia are plotting new computer cyber weapon to sabotage the Iranian nuclear program…

12 years ago

MS Windows XP CVE-2013-5065 Eleventh zero-day flaw found by FireEye

FireEye Security Experts discovered Microsoft Windows XP and Server 2003 privilege escalation zero-day exploit Security experts at FireEye have discovered a new zero-day, a…

12 years ago

Google Nexus vulnerable to SMS-based DOS attack

Bogdan Alecu, a system administrator at Dutch IT services company Levi9, discovered that Google Nexus phones are vulnerable to SMS-based…

12 years ago

US Forces sentenced for use of pirated copies in critical missions

The U.S. Government was sentenced for $50 Million because it has used of pirated copies of Military Software designed by…

12 years ago

Internet of Things – Symantec has discovered a new Linux worm

Symantec security experts have discovered a new Linux worm that was designed to target the “Internet of things” infecting Intel…

12 years ago

Ruby on Rails CookieStore flaw exposes thousand of websites

A security issue inside cookie-based storage mechanism of Ruby on Rails could expose thousand websites to cyber attacks. Ruby on…

12 years ago

New crimekit Atrax exploits Tor, mines Bitcoin and much more

Atrax, yet another commercial crimekit on the black market, a malware able to exploit Tor and that implements numerous features…

12 years ago

This website uses cookies.