security

Insecure Medical devices are enlarging surface of attacks for organizations

A study conducted by the Ponemon Institute shows insecure Medical devices are enlarging the surface of attacks for organizations. A…

9 years ago

Information Security Practices of Aadhaar – 135 Million Indian government payment card details leaked

A CIS study estimated number of Aadhaar numbers leaked through 4 gov portals could be around 135 million and 100M…

9 years ago

The Hajime Botnet continues to grow and implements a new attack technique

The mysterious Hajime Botnet continues to grow and reached 300,000 IoT Devices, the author also implemented a new attack method.…

9 years ago

Symantec is monitoring the Hajime IoT malware, is it the work of vigilante hacker?

Symantec observed the Hajime IoT malware leaving a message on the devices it infects, is it the work of a…

9 years ago

Netflix releases the Stethoscope tool to improve security

Netflix has released the Stethoscope open source web application that provides recommendations for securing their devices. Netflix has released Stethoscope, an…

9 years ago

Researchers exfiltrate data by blinking the LEDs on the hard drives

A team of Israeli researchers has devised a new technique to exfiltrate data from a machine by using a malware…

9 years ago

FTP Injection flaws in Java and Python allows firewall bypass

The two programming languages, Java and Python, are affected by serious FTP Injection flaws that can be exploited by hackers…

9 years ago

RSA Conference 2017 attendees hacked with rogue access points

Experts at Pwnie Express discovered multiple rogue access points on the show floor that were used to hack the RSA…

9 years ago

Senators want more info on Trump’s personal phone and its defense

Two US senators want detailed info on Trump’s personal phone and the way the Defense Information Systems Agency (DISA) will…

9 years ago

5 Anti-Surveillance tools that can help you enhance online security and privacy

The current digital era is filled with all sorts of cyber dangers. The following tools will help you remain safe…

9 years ago

This website uses cookies.