Torrent Risks: How to get infected through torrent with a good reputation

7 years ago

Experts at Z-Lab Yoroi/Cybaze have conducted an interesting analysis on the risks for users downloading films, games, and software through…

Cisco addresses a critical static credential flaw in Common Services Platform Collector

7 years ago

Cisco released security updates to address a critical vulnerability in its Cisco Common Services Platform Collector (CSPC) software. Cisco released…

CSRF flaw in WordPress potentially allowed the hack of websites

7 years ago

Security researcher Simon Scannell from RIPS Technologies, has discovered a new CSRF vulnerability in WordPress, that could potentially lead to…

39% of all existing Counter-Strike 1.6 game servers online are malicious

7 years ago

Experts at security firm Dr. Web revealed that 39% of all existing Counter-Strike 1.6 game servers online are malicious, an…

DMSniff POS Malware has flown under the radar for at least four years

7 years ago

Malware researchers at Flashpoint revealed that at least since 2016, a PoS malware dubbed DMSniff has flown under the radar.…

CVE-2019-0797 Windows Zero-Day exploited by FruityArmor and SandCat APT Groups

7 years ago

One of the zero-day flaws (CVE-2019-0797) patched this week by Microsoft has been exploited in targeted attacks by several threats…

Modular Cryptojacking malware uses worm abilities to spread

7 years ago

Security experts at 360 Total Security have discovered a new modular cryptocurrency malware that implements worm capabilities to spread. Security…

Russia attempts to prevent Russian citizens from using ProtonMail

7 years ago

ProtonMail back after the Russian government has been attempting to prevent Russian citizens from sending messages to ProtonMail. ProtonMail is…

Microsoft Patch Tuesday updates for March 2019 patches two Windows flaws exploited in targeted attacks

7 years ago

Microsoft Patch Tuesday updates for March 2019 address 64 flaws, including two Windows zero-day vulnerabilities exploited in targeted attacks. Microsoft…

Users claim Samsung Galaxy S10 Face Recognition can be bypassed

7 years ago

The screen lock feature in the Samsung Galaxy S10 that is based on face recognition can be easily bypassed using…

This website uses cookies.