Security

Facebook flaw allows the disclosure of Friends List

This POC demonstrates that exploiting a Facebook flaw it is possible the disclosure of Friends List EVEN WHEN HE HAS…

13 years ago

FBI Android malware used for investigations

Former FBI officers revealed to the Wall Street Journal the existence of FBI Android malware that is used to spy…

13 years ago

Syrian Electronic Army hacked White House employees personal emails

At least three White House employees personal Gmail accounts hacked by the popular group of hackers knows as Syrian Electronic…

13 years ago

Q2 2013 Superfecta report, constant increase for automated attacks

FireHost Secure cloud hosting company issued Q2 2013 Superfecta report that revealed a sharp increase in blended, automated attacks. FireHost announced the…

13 years ago

Credit Card Redirection, the evolution of phishing

Researchers at Securi discover Credit Card Redirection attack technique to hijack credit card data during transactions on e-commerce sites. With…

13 years ago

Spy agencies ban on Lenovo PCs due to backdoor vulnerabilities

Spy agencies reportedly have a long-standing ban on Lenovo PCs due to backdoor vulnerabilities that could allow an attacker to…

13 years ago

GPS vulnerability exploitable to control the route of a vessel

A GPS vulnerability could allow hackers and terrorists to hijack ships, drones and commercial airliners, the GPS expert Todd Humphreys…

13 years ago

Web Application Attack Report … US is primary source of attacks

Imperva released a Web Application Attack Report that provides an overview of the principal cyber security events occurred during the…

13 years ago

KINS trojan is threatening banking sector

KINS trojan is the name of the new banking malware that RSA researchers discovered thanks to an announcement on the Russian…

13 years ago

Web Application Vulnerabilities 2013 – Context Information Security

Context Information Security  issued the report "Web Application Vulnerability Statistics 2013" that provides statistic on Web Application Vulnerabilities based on data…

13 years ago

This website uses cookies.