Posts
Showing posts from February, 2019
The Kremlin told about hacker attacks on the website of the President of Russia
- Get link
- X
- Other Apps
Indian students create an app for detecting fake news
- Get link
- X
- Other Apps
In-Browser Cryptomining Service, 'Coinhive' to Shut Down on March 8, 2019
- Get link
- X
- Other Apps
MassBleed – An Open Source SSL Vulnerability Scanner
- Get link
- X
- Other Apps
The Australian Parliament’s Anti –Encryption Law Opening Doors to Potential Cyber Attacks
- Get link
- X
- Other Apps
Iranian Hackers Come Worryingly close To Israel’s Missile Warning System
- Get link
- X
- Other Apps
US Pressures Its Allies against the Usage of Chinese Firm Huawei’s Technology; Suspects the Products to Spy on Other Countries
- Get link
- X
- Other Apps
Attackers Launched a Rapidly Changing Malware which uses .DOC Extension
- Get link
- X
- Other Apps
Around 25 million Home Voice Assistants vulnerable to hacking globally
- Get link
- X
- Other Apps
Hackers Begin Exploiting WinRAR ACE Vulnerability To Install Backdoor
- Get link
- X
- Other Apps
The Phishing Campaign That Uses Variations of Attack Patterns To Evade Detection
- Get link
- X
- Other Apps
Vulnerability in IBM SoftLayer Technology Allows Old Customers to Access New Customer Data
- Get link
- X
- Other Apps
40.8% Smart Homes vulnerable to attacks
- Get link
- X
- Other Apps
The Dark Side of Kremlin- The Catalogue of Russian Data Leaks: All You Need To Know
- Get link
- X
- Other Apps
YAWAST – Open Source Web Application Information Gathering Toolkit
- Get link
- X
- Other Apps
Facebook Removed Onavo Protect From Google Play Store Voluntarily
- Get link
- X
- Other Apps
New attack lets hackers run bad code despite users leaving web page
- Get link
- X
- Other Apps
File-less Malware Is Wreaking Havoc Via PowerShell.
- Get link
- X
- Other Apps
Yahoo Mail Vulnerability Nets Researcher $10,000 Bounty
- Get link
- X
- Other Apps
Point-of-Sale Firm Suffered Malware Attack Affecting More Than 130 Outlets
- Get link
- X
- Other Apps
Facebook Launches Better Background Control Privacy For Android Users
- Get link
- X
- Other Apps
An Ethical Hacking Story — The Yummy Days Case by Héctor Martos
- Get link
- X
- Other Apps
How To Ensure Your Tech Business Uses Only The Cleanest Of Services
- Get link
- X
- Other Apps
Q&A with Dave Greenfield, secure networking evangelist, Cato Networks
- Get link
- X
- Other Apps
Office 365 Phishing Strategy Tricks Users With Live Chat Support
- Get link
- X
- Other Apps
Venom - A Multi-hop Proxy For Penetration Testers
- Get link
- X
- Other Apps
Moldovan Parliament Speaker accused Russia of trying to interfere in the elections
- Get link
- X
- Other Apps
LinkedIn Direct Messages Exploited Via “more_eggs” Backdoor
- Get link
- X
- Other Apps
The Consular Department of the Russian Embassy in Austria was attacked by hackers.
- Get link
- X
- Other Apps
IIS Vulnerability Triggers a Denial-of-Service
- Get link
- X
- Other Apps
Banking Malware uses Fake reCAPTCHA page to target banking customers
- Get link
- X
- Other Apps
DNS Cache Poisoning by Christopher Makarem
- Get link
- X
- Other Apps
What is a quantum computer? Explained with a simple example by YK Sugi
- Get link
- X
- Other Apps