Discover how it is possible to apply steganography to hide secret messages in common tweets (or any text) with steg.js-of-the-dump. In the past we have discussed many times on the adoption of stegan ...
Dutch malware detection company RedSocks has issued its first Malware Trend Report related to the malicious code trends observed in the first quarter of 2014. RedSocks, a Dutch malware detection comp ...
Technion students Find a security vulnerability in the Internet DNS protocol which allows the attackers to redirect users to a website they control. A significant new security vulnerability has bee ...
Expert at Trustwave explained the tactics adopted by cyber criminals how to serve malware in phishing attacks exploiting .lnk files. Phil Hay, expert at Trustwave SpiderLab, explained how cyber c ...