Security

Adobe Reader vulnerability reveals where a PDF is opened

The McAfee security firm found an Adobe Reader vulnerability that reveals where a PDF document is opened. The McAfee security firm found an Adobe…

13 years ago

APWG Global Phishing Survey report revealed new scaring trends

APWG issued the new edition of its APWG Global Phishing Survey report that identifies trends and their significance by quantifying the…

13 years ago

LivingSocial data breach exposed 50M customer records

LivingSocial data breach exposed 50 million customer records, the news is shocking and is circulating on the Internet since last Friday.…

13 years ago

FireEye report on advanced cyber attacks landscape

FireEye report on the evolution of sophisticated cyber threats and their diffusion on global scale FireEye security firm has published another interesting report,…

13 years ago

Critical vulnerability in Viber exposes mobile user to serious risks

Critical vulnerability in Viber allow bypass security mechanisms We have discussed in various occasions of security in mobile environments, mobile device are becoming the center of…

13 years ago

Hacktivists hacked Twitter account of Associated Press to post fake news

Recently hackers have intensified the number of attacks against corporate social media accounts, the Twitter account is most targeted ones…

13 years ago

Verizon, large scale cyber espionage from China and much more

Verizon has issued the “2013 Data Breach Investigations Report” that investigates on a series of documented data breaches. Verizon’s RISK Team,…

13 years ago

New wave of DDoS against EU Banking can hide a sinister mystery

In the last months of 2012 a group of hackers known as “Izz ad-Din al-Qassam Cyber Fighters” conducted a series…

13 years ago

HTTP-Botnets: The Dark Side of a Standard Protocol!

When the HTTP protocol was born in 1999, no one ever thought it will be used by one of the…

13 years ago

Almost all game hacks are infected with malware

Security worldwide community is alarmed by the explosion of number of cyber threats that are becoming even more sophisticated and…

13 years ago

This website uses cookies.