backdoor

A Wide Open Backdoor is present in million Netis Routers

Routers manufactured by Netcore and sold worldwide under Netis brand have a wide-open backdoor that can be fairly easily exploited…

11 years ago

Reading the Malware Trend Report, Q2 2014 issued by RedSocks

RedSocks Malware Research Labs issued the Malware Trend Report Q2 2014, which contains data evolution of principal cyber threats observed…

12 years ago

F-Secure discovered Xiaomi handset spying on users’data

Experts at F-Secure security firm analyzing the new Xiaomi RedMi 1S discovered that it sends out to a server located…

12 years ago

Thousands of WordPress Sites hacker through MailPoet flaw

Security experts at Sucuri form have observed a surge of cyber attacks against WordPress website which are using not updated…

12 years ago

Encryption Tool TrueCrypt shuts down mysteriously. Is it unsecure?

Encryption Tool TrueCrypt shuts down mysteriously, a message on the official SourceForge-hosted page is encouraging users to adopt Microsoft Bitlocker.…

12 years ago

Nice Recording eXpress lawful intercept solution is flawed

Researchers at SEC Consult Vulnerability Lab discovered that Nice Recording eXpress lawful intercept software contains numerous flaws, including a backdoor.…

12 years ago

NSA intercepts US-made Routers to implant surveillance backdoor

Journalist Glenn Greenwald published the last revelation of NSA surveillance, the agency tampers with US-made internet routers destined for foreign…

12 years ago

Check Point Security Report 2014 – Malware in the enterprise

Check Point 2014 Security Report shows major security events occurred in 2013 show and provides useful information on current malware…

12 years ago

RedSocks, An interesting vision on Malware trend in Q1

Dutch malware detection company RedSocks has issued its first Malware Trend Report related to the malicious code trends observed in…

12 years ago

How to hide a backdoor using PHP Callback Functions

Securi firm has published an interesting post to explain how malware authors could hide a backdoor using PHP Callback functions.…

12 years ago

This website uses cookies.