Hack This: An Overdue Python Primer
In writing the most recent Hack This (“Scrape the Web with Beautiful Soup”) I again found myself trapped between the competing causes of blog-brevity and making sure everything is totallyRead More →
Data Security News | Infosec Blog | Cyber Security Tutorials
In writing the most recent Hack This (“Scrape the Web with Beautiful Soup”) I again found myself trapped between the competing causes of blog-brevity and making sure everything is totallyRead More →
Lurking in the kernel for nine years, flaw gives untrusted users unfettered root access. A serious vulnerability that has been present for nine years in virtually all versions of the LinuxRead More →
Yesterday, GData malware analyst Karsten Hahn discovered an in-development ransomware disguised as a click me game. When executed the ransomware will launch a screen that contains a Click Me button that a userRead More →
Russian man drove luxury car, then collapsed after being apprehended, police say. An alleged Russian hacker arrested in the Czech Republic following an FBI-coordinated tip-off is suspected of taking part in aRead More →
Biggest credit card replacement in India’s history. The State Bank of India (SBI) said today it decided to block over 600,000 debit cards after rumors of a malware infection onRead More →
As we keep a tab on exploit kits, today we are looking at some changes with Sundown EK. Nowhere near as popular as RIG EK, this exploit kit still remains aRead More →
Experts from the White Fir Design discovered cybe rcriminals exploited a zero-day flaw in an e-commerce plugin for WordPress to upload a backdoor. According to the experts from the firmRead More →
Who needs complicated malware when you have dynamite.Criminals like to use explosives to break into ATMs, rather than deploy malware, a recent European ATM Security Team (EAST) report has shown.Read More →
In the first half of 2016 we noticed that Android banking Trojans had started to improve their phishing overlays on legitimate financial apps to ask for more information. Victims were requested toRead More →
Malware author returns to IoT landscape following Mirai’s success and the wealth of vulnerable devices. The Krebs DDoS attacks have proven that the IoT landscape is a fertile ground that canRead More →