Security

Why do we need for Incident Response plan?

Due to the constant growth in the number of cyber attacks it is necessary to properly define the actions composing…

12 years ago

Cyberespionage – Chinese Hackers targeting US Cloud service providers

U.S.-China Economic and Security Review Commission reported for the first time that cloud computing “represents a potential espionage threat.” U.S.-China…

12 years ago

Mobile apps security study conducted by HP Fortify

A study conducted by company's enterprise security arm HP Fortify revealed that the majority of  mobile apps based on iOS…

12 years ago

Report on commodities value in the cyber criminal underground market

Security experts Stewart from Dell SecureWorks and independent researcher David Shearhave explored online underground marketplace for stolen data. Digital identity…

12 years ago

NSA compromised more than 50000 networks with malware

A new report based on documents leaked by Snowden revealed that the NSA placed malicious software on more than 50000…

12 years ago

Facebook vulnerability allows to view hidden Facebook Friend List

Researcher Irene Abezgauz  from the Quotium Seeker Research Center discovered a Facebook flaw that allows anyone to see a profile’s…

12 years ago

i2Ninja – A new financial malware being sold on Russian underground

Trusteer researchers have uncovered a sneaky piece of financial malware, known as i2Ninja, being sold on a Russian cyber crime…

12 years ago

Jboss Application Server flaw exploit allows web shell code injection

Imperva experts detected a surge in the exploitation of Jboss Application Server as result of the public disclosure of an…

12 years ago

British blogger discovered LG Smart TV spying on users

British blogger revealed that his LG Smart TV collects and sends details about the owners' viewing habits even if the…

12 years ago

MS Silverlight 5 flaw exposes 40M Netflix users to security risk

Users of Netflix, the provider of on-demand Internet streaming media, must beware of Silverlight exploit that could allow attackers to…

12 years ago

This website uses cookies.