Security Affairs newsletter Round 36 – Best of the week from best sourcesSecurity Affairs newsletter Round 36 – Best of the week from best sources

Security Affairs newsletter Round 36 – Best of the week from best sources

10 years ago

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from the best sources…

Police Body Cameras come with Conficker WormPolice Body Cameras come with Conficker Worm

Police Body Cameras come with Conficker Worm

10 years ago

Police body cameras sold by Martel Electronics have been found to be infected with the notorious Conficker worm. Security experts…

Shedun adware can install any malicious mobile app by exploiting Android Accessibility ServiceShedun adware can install any malicious mobile app by exploiting Android Accessibility Service

Shedun adware can install any malicious mobile app by exploiting Android Accessibility Service

10 years ago

Shedun Trojanized adware family implements the ability to automatically install any app on the devices by exploiting the Android Accessibility…

DHS Information Security Program, Dozens secret databases vulnerable to hackDHS Information Security Program, Dozens secret databases vulnerable to hack

DHS Information Security Program, Dozens secret databases vulnerable to hack

10 years ago

Evaluation of DHS Information Security Program for Fiscal Year 2015 revealed the existence of dozens of top-secret unpatched databases. The story I'm…

The new Nmap 7 version just releasedThe new Nmap 7 version just released

The new Nmap 7 version just released

10 years ago

After 3.5 years, Fyodor has released the new version of the popular open-source network-exploration tool Nmap 7. After 3.5 years, Fyodor…

Anonymous Took Down 20,000 pro-ISIS Twitter accountsAnonymous Took Down 20,000 pro-ISIS Twitter accounts

Anonymous Took Down 20,000 pro-ISIS Twitter accounts

10 years ago

In the wake of Paris attacks Anonymous continues its campaign against the ISIS and announced to have taken down 20,000 pro-ISIS…

Zerodium price list for secret Hacking methodsZerodium price list for secret Hacking methods

Zerodium price list for secret Hacking methods

10 years ago

The Zerodium (Zero-day broker) company has published a price list for various classes of software targets and digital intrusion methods. In an…

SilverPush technology tracks user habits with near-ultrasonic soundsSilverPush technology tracks user habits with near-ultrasonic sounds

SilverPush technology tracks user habits with near-ultrasonic sounds

10 years ago

The SilverPush technology allows advertising firm to track user habits with near-ultrasonic sounds.How does it work? A few days ago,…

The ISIS guide, how to stay secure onlineThe ISIS guide, how to stay secure online

The ISIS guide, how to stay secure online

10 years ago

Which are the technological tools used by the ISIS? Do the terrorists know how to avoid the surveillance online? The…

Nested backdoor affects 600,000 Arris cable modemsNested backdoor affects 600,000 Arris cable modems

Nested backdoor affects 600,000 Arris cable modems

10 years ago

A Brazilian security researcher has discovered a nested backdoor affecting nearly 600,000 Arris cable modems. Arris is working to fix…