authentication

A backdoor present in many D-Link devices allows to bypass authentication

Researcher Craig published an interesting blog post on "/dev/ttyS0" on the reverse engineering of the backdoor present in many D-Link devices.…

12 years ago

Chaos Computer Club claims to have defeated Apple TouchID

Chaos Computer Club claims to have bypassed the biometric security technology Apple TouchID by making a copy of a fingerprint photographed…

12 years ago

Vulnerability in Windows Phone OS could allow information disclosure

Microsoft Security Advisory reveals a vulnerability in Windows Phone OS that could allow information disclosure Microsoft has issued a security advisory related to…

13 years ago

Vulnerability disclosed pwds of all Barracuda Network Employees

Security expert Ebrahim Hegazy has found a Password disclosure vulnerability in Barracuda update servers which allows to gain access to…

13 years ago

Brute-forcing applications spotted in the wild … pros and cons

Brute forcing applications spotted in the wild demonstrates the continual interest of cybercrime ... What is the limitations of this attack…

13 years ago

Two-factor Authentication for SMBs

The purpose of this article is to cover the challenges SMBs are facing when it comes to using authentication methods…

13 years ago

Two-factor authentication, necessary but not sufficient to be safe

Adoption of a two-factor authentication process is necessary  to increase the robustness for authentication processes, but security is a process…

13 years ago

Hacktivists hacked Twitter account of Associated Press to post fake news

Recently hackers have intensified the number of attacks against corporate social media accounts, the Twitter account is most targeted ones…

13 years ago

WordPress sites under massive brute-force attack

Any owner of WordPress site is shaking causes of the threat that someone could steal its credentials, everybody would do…

13 years ago

PiceBOT crimeware hit Latin American banking

In the last weeks we discussed on the efficiency of exploit kits, malicious tool kits  that allow to the attackers…

13 years ago

This website uses cookies.