Mark Sparshott, director at Proofpoint, explained that cybercrime manages phishing emails using techniques similar to those used by the marketing…
Chris Soghoian, principal technologist with the American Civil Liberties Union, explained that government surveillance could exploit service update process. Chris…
Security experts at Mandiant have discovered that hackers break into Washington Post servers stealing employee users credentials hashes. Security experts…
Due to the constant growth in the number of cyber attacks it is necessary to properly define the actions composing…
The energy industry continues to be a privileged target for cyber attacks of hacktivists, state-sponsored hackers and cybercriminals. The alarm…
Researcher Dan Melamed recently discovered an open url redirection flaw in Facebook that allowed to have a facebook.com link redirect…
TrendLabs has just published the third quarterly report, titled The Invisible Web Unmasked, on the evolution of cybercrime observed in…
FireEye Labs has identified a new IE zero-day exploit used for a watering hole attack in the US. As usual…
Microsoft Zero-day CVE-2013-3906 - Microsoft informed to be aware of a vulnerability in a Microsoft graphics component that is actively…
The professional social network LinkedIn is a mine of information for any king of attackers, a Websense post described…
This website uses cookies.