Security

Mobile devices and cyber espionage, principal concerns for governments

The use of mobile devices in government environments concerns the secret service of any states, cyber espionage more often exploits…

12 years ago

A Zero-Day Vulnerability in Microsoft Graphics Component – CVE-2013-3906

Microsoft Zero-day CVE-2013-3906 - Microsoft informed to be aware of a vulnerability in a Microsoft graphics component that is actively…

12 years ago

Android 4.4 KitKat also affected by Master Key vulnerability

Security expert Jay Freeman discovered another Master Key vulnerability in Android 4.4 that allows attackers to inject malicious code in…

12 years ago

Cyberbullying Infograph – know to fight it

The post is an intro to Cyberbullying concept and proposes an interesting infograph to better understand the entity of the…

12 years ago

Finland’s Ministry of Foreign Affairs hit by extensive cyber espionage

Finland's foreign minister announced that foreign intelligence agents had carried out large-scale cyber espionage into government communications. The Finnish Ministry…

12 years ago

Anonymous OpNSA Campaign – OSINT to predict DDoS attacks on Nov 5th

  OpNSA analyzed with OSINT techniques based on the correlation of media activities and physical protests. The analysts provided a…

12 years ago

I don’t like – Facebook Clickjacking and track screen cursors

A misleading script to increase the number of "I like" and an invasive technology to track screen cursors are threatening…

12 years ago

Hidden chips inside irons for cyber espionage

The State-owned channel Rossiya 24 has showed the images of an iron included in a batch of Chinese imports where…

12 years ago

Prolexic on the Distributed Reflection Denial of Service attacks

Prolexic DDoS Attack Report reveals an increasing interest of cybercrime in Distributed Reflection Denial of Service technique, efficient and cost-effective.…

12 years ago

Twitter Unrestricted File Upload Vulnerability

Security expert Ebrahim Hegazy has found another serious vulnerability in Twitter, he has discovered an Unrestricted File Upload Vulnerability. The…

12 years ago

This website uses cookies.