Is the FBI Hiding a Firefox Zero-Day?
After FBiOS, get ready for Mozilla vs. the FBI.A question posed by a researcher from the International Computer Science Institute in Berkeley, California has led many to believe, even us,Read More →
Data Security News | Infosec Blog | Cyber Security Tutorials
After FBiOS, get ready for Mozilla vs. the FBI.A question posed by a researcher from the International Computer Science Institute in Berkeley, California has led many to believe, even us,Read More →
Threat level is not high, the virus requires users to give it root privileges in order to infect their computers. After being bombarded with new malware towards the end ofRead More →
A group of security researchers has found a security flaw in the Apple iMessage that exposed chat history and sensitive data with a single click. Recently WhatsApp has introduced the end-to-endRead More →
I had almost forgotten about my experience with Worldpay’s Merchant Portal from just over a year ago, but my recent post regarding another payment processor helped to refresh my memory. IRead More →
Ramdo is a family of malware that performs fraudulent website ‘clicks.’ Ramdo malware activity first surfaced in late 2013 and has since continued to infect machines worldwide, primarily through theRead More →
A new ransomware has been released that not only encrypts your files, but also deletes them if you take too long to make the ransom payment of $150 USD. The Jigsaw Ransomware,Read More →
An individual going by the twitter handle leostone was able to create an algorithm that can generate the password used to decrypt a Petya encrypted computer. In my test this, this algorithm was ableRead More →
The Check Point Mobile Threat Prevention team has long stressed how dangerous it can be to get apps from places other than the Apple App Store and Google Play EvenRead More →
A new ransomware called CryptoHost was discovered by security researcher Jack that states that it encrypts your data and then demands a ransom of .33 bitcoins or approximately 140 USD to get your files back.Read More →
Proofpoint researchers discovered that the Magnitude exploit kit (EK) [1] was successfully exploiting Adobe Flash version 20.0.0.306. Because the Magnitude EK in question did not direct any exploits to FlashRead More →