The researchers at the Tor project are working on a new distributed random number generator that will be included in…
Today I want to share you my interview with one of the greatest white hat hackers in the IT Security…
A data breach suffered by LinkedIn back in 2012 is still haunting the security community. In 2012, LinkedIn suffered an…
Malware authors behind the DMA Locker ransomware have improved the threat is a significant way, now it is ready for…
The Pastejacking Attack exploits JavaScript to override the clipboard content and trick victims into running malicious code. The security expert…
Daniel Kaufman announced that Google is planning to make password identifications outmoded by 2017 and replace them with trust scores.…
What is a SOC? What is its mission? Which are the Security tools and technology components of a SOC? Here…
The FBI issued a notification warning actors in the private sector about a rapid diffusion of KeySweeper, a keystroke loggers…
Security experts from PaloAlto Networks collected evidence that the Operation Ke3chang discovered by FireEye in 2013 is still ongoing. Back…
Security experts from Melani published a detailed technical report about the strain of Turla used in the cyberespionage attack against…
This website uses cookies.