The Italian security firm Tiger Security issued a report on the current state of cyber attacks against the organization of…
Prolexic security and engineering response team has issued a study on the possible uses of Zeus malware, remarking that its…
Security researchers at Sucuri firm have discovered multiple serious vulnerabilities in the popular ‘All In One SEO Pack’ plugin for…
French telecom giant Orange has suffered the second data breach of the year on April 18th. Hackers violated its website…
Hit and Run DDoS attacks are composed by a series of short bursts of high volume attacks, having a limited…
TrendMicro has published an excellent study on the evolution of the Russian underground, detailing products, services and related prices. Max…
Verizon Data Breach Investigation Report 2014, to better understand how attackers can affect company business, and learn the proper countermeasures.…
A researcher discovered a flaw in the section "notes" of the social network Facebook that could be exploited by anyone…
Eugene Kaspersky explained that SmartTV are vulnerable to malware-based cyber attacks, it's a question of time to assist a large-scale…
According principal security firms, extortion, ransom and blackmail are pillars of illicit activities, cyber criminals are adapting them to the…
This website uses cookies.