More than 500,000 IoT devices potentially recruitable in the Mirai Botnet

9 years ago

Security experts have discovered more than 500,000 vulnerable Internet of Things (IoT) devices that could be potentially recruited in the…

Update X.Org libraries to avoid Privilege Escalation and DoS attacks

9 years ago

X.Org released patches and updates to fix several flaws found in many client libraries that could be exploited to cause…

Magecart campaign – Hackers target eCommerce sites with web-based keylogger injection attacks

9 years ago

Researchers have been monitoring a campaign dubbed Magecart that compromised many ecommerce websites to steal payment card and other sensitive…

New FastPoS PoS malware implements a ‘quickly and dirty’ approach to steal card data

9 years ago

The author of the FastPoS PoS malware issued an update that profoundly changes its behavior, preferring a quick exfiltration activity…

Authorities arrested 2 teenagers suspected to be members of Lizard Squad

9 years ago

A joint operation of international law enforcement agencies allowed the arrest of suspected Lizard Squad Hackers in the US and…

Expert developed a Mac malware that lies in wait for user to start video apps

9 years ago

Mac malware could spy on users by piggybacking on webcam sessions started by legitimate applications such as FaceTime, Skype and…

Which are principal cities hostages of malicious botnets?

9 years ago

Which are principal cities hostages of malicious botnets? Symantec has tried to reply the difficult questions with an interesting study.…

Yahoo – The Reuter’s article is misleading and the surveillance tool doesn’t exist

9 years ago

A few hours after the Reuters reported the existence of a surveillance tools used by Yahoo for email massive scanning,…

New Cerber ransomware variant kills common database-related processes

9 years ago

A new variant of the Cerber ransomware kills common database-related processes like those of the MySQL, Oracle and Microsoft SQL…

FBI arrested another NSA contractor involved in theft of secret documents

9 years ago

Once again an NSA contractor is the headlines for the alleged theft of secret exploit codes and highly confidential documents.…

This website uses cookies.