Verizon Data Breach Investigation Report 2014, to better understand how attackers can affect company business, and learn the proper countermeasures.…
A researcher discovered a flaw in the section "notes" of the social network Facebook that could be exploited by anyone…
Eugene Kaspersky explained that SmartTV are vulnerable to malware-based cyber attacks, it's a question of time to assist a large-scale…
According principal security firms, extortion, ransom and blackmail are pillars of illicit activities, cyber criminals are adapting them to the…
The Global Threat Intelligence Report (GTIR) addresses the security challenges of organizations globally analyzing 3 billion worldwide attacks occurred in 2013.…
Security analysts at SenceCy which are monitoring the advancement of a new Zorenium Bot discovered that it is able to…
Documents leaked by Snowden reveals that NSA has built a surveillance system capable of recording all the phone calls of…
Recent revelations on TURBINE platform include also a disturbing truth, NSA used QUANTUMHAND exploits to implant malware in Facebook users'…
The group of hacktivists Cyber Berkut hit several NATO websites with DDoS attacks while in the Crimea is being a…
TURBINE is the codename for a sophisticated hacking platform to take control of C&C servers managed by cybercrime. The NSA…
This website uses cookies.