CloudFanta Malware Steals Banking Information Via Cloud Storage AppsCloudFanta Malware Steals Banking Information Via Cloud Storage Apps

CloudFanta Malware Steals Banking Information Via Cloud Storage Apps

9 years ago

Watch out, threat research labs Netskope spotted the CloudFanta Malware Stealing Banking Information Via Cloud Storage Apps. Threat Research Labs,…

CVE-2016-7855 flaw in Adobe Flash Player exploited in targeted attacksCVE-2016-7855 flaw in Adobe Flash Player exploited in targeted attacks

CVE-2016-7855 flaw in Adobe Flash Player exploited in targeted attacks

9 years ago

Adobe has issued a security patch for its Flash Player that fixes a critical vulnerability, tracked as CVE-2016-7855, used in…

Pwn2Own 2016 – Keen Team won $215k by hacking Nexus 6p and iPhone 6SPwn2Own 2016 – Keen Team won $215k by hacking Nexus 6p and iPhone 6S

Pwn2Own 2016 – Keen Team won $215k by hacking Nexus 6p and iPhone 6S

9 years ago

Tencent Team Keen won $215k at PWN2OWN Mobile by hacking Nexus 6p and using two exploits for the iPhone iOS…

Cellebrite digital forensics tools leaked online by a resellerCellebrite digital forensics tools leaked online by a reseller

Cellebrite digital forensics tools leaked online by a reseller

9 years ago

The firmware used by the Israeli mobile forensic firm Cellebrite was leaked online by one of its resellers, the McSira…

Domain Hijacking – An Invisible and Destructive Threat We Should Watch ForDomain Hijacking – An Invisible and Destructive Threat We Should Watch For

Domain Hijacking – An Invisible and Destructive Threat We Should Watch For

9 years ago

The Morphus Labs warns about another major threat, the domain hijacking incident, a threat that can completely subvert your information…

Two Critical Vulnerabilities Patched in Joomla 3.6.4. Update it asap!Two Critical Vulnerabilities Patched in Joomla 3.6.4. Update it asap!

Two Critical Vulnerabilities Patched in Joomla 3.6.4. Update it asap!

9 years ago

Joomla has released the new version Joomla 3.6.4 that fixes two critical account creation vulnerabilities affecting the popular CMS. Recently…

Upgrade your iPhone to iOS 10.1 or you can get hacked by opening a JPEG or a PDFUpgrade your iPhone to iOS 10.1 or you can get hacked by opening a JPEG or a PDF

Upgrade your iPhone to iOS 10.1 or you can get hacked by opening a JPEG or a PDF

9 years ago

Viewing a maliciously crafted JPEG may lead to arbitrary code execution, a boobytrapped JPEG could compromise your iPhone. Upgrade to…

Kaspersky Lab launched the new Lab ICS-CERTKaspersky Lab launched the new Lab ICS-CERT

Kaspersky Lab launched the new Lab ICS-CERT

9 years ago

Kaspersky Lab has launched a new global computer emergency response team (CERT), the Kaspersky Lab ICS-CERT, focusing on industrial control…

Millions of Android smartphones exposed to new Drammer Android attackMillions of Android smartphones exposed to new Drammer Android attack

Millions of Android smartphones exposed to new Drammer Android attack

9 years ago

A new method of attack dubbed DRAMMER could be exploited to gain 'root' access to millions of Android smartphones and…

Hacking GSM A5 crypto algorithm by using commodity hardwareHacking GSM A5 crypto algorithm by using commodity hardware

Hacking GSM A5 crypto algorithm by using commodity hardware

9 years ago

Researchers demonstrated how to crack GSM A5/1 Stream Cipher using a general-purpose graphics processing unit computer with 3 NVIDIA GeForce…