Javascript Leads to Browser Hijacking
I came across this nasty-looking script that hijacks your browser. It appears to have been around in some shape or form since 2014 but this latest version deploys an aggressiveRead More →
Data Security News | Infosec Blog | Information Security Tutorials
I came across this nasty-looking script that hijacks your browser. It appears to have been around in some shape or form since 2014 but this latest version deploys an aggressiveRead More →
As technology matures and microprocessors are becoming cheap we are starting to see a trend of products that are now ?smart.? The problem is that once we discover how theseRead More →
Project Soli, which debuted at Google I/O in 2015, is a tiny chip that uses radar to detect discreet hand and finger motions. It was designed as a unique wayRead More →
Windows Management Instrumentation (WMI) hijackers are proving to be a plague to remove for the average user. Even experienced users may be stumped if they run into one and don’tRead More →
It was one of those warm summer nights, no clouds, just a bright full moon lighting the way. Someone had unknowingly stumbled upon our honeypot, completely unaware of the factRead More →
The Shadow Brokers – the hacker group who claimed to have stolen a large cache of National Security Agency (NSA) hacking tools – is disappointed to find that it’s theRead More →
The online storage platform Dropbox suffered a massive blow back in August when the company learned that over 60 million of its user accounts got hacked and credentials stolen byRead More →
The newly-discovered bug gives attackers the chance to execute code through the open-source JPEG 2000 codec. Cisco Talos researchers have uncovered a severe zero-day flaw in the OpenJPEG JPEG 2000Read More →
On Monday morning, a number of professionals in the aerospace industry received a rather mundane email containing a PDF ostensibly about the future of Russian aerospace programs, but which actuallyRead More →
Recent research on web security and related topics. Provided and maintained by members and friends of the Chair for Network and Data Security, Horst Görtz Institute, Ruhr-University Bochum. Do youRead More →