Flash – aaah-aarrgh! Patch now as hackers exploit fresh holes
Flash, I love you, but we only have fourteen hours to save everyone’s computers. Adobe has urged users to patch their Windows, OS X and Linux editions of Flash Player toRead More →
Data Security News | Infosec Blog | Information Security Tutorials
Flash, I love you, but we only have fourteen hours to save everyone’s computers. Adobe has urged users to patch their Windows, OS X and Linux editions of Flash Player toRead More →
This hack can boot Linux on PlayStation 4 This is not the first time that fail0verflow announced it had successfully hacked Sony’s PlayStation 4 to run Linux, and even showcased toRead More →
A security researcher has devised a new technique to track users by analyzing the mouse movements, even when surfing on the Tor network. While we surf on the Internet weRead More →
A group of security researchers from the Edinburgh Napier University elaborated a new DDoS amplification technique relying on the TFTP protocol. A group of security experts from the Edinburgh NapierRead More →
Printed electronics makes the perfect fake fingerprint. Boffins from Michigan State University have loaded up an inkjet printer with cartridges designed for printing electronic circuits, and used the output to foolRead More →
It appears that the KeRanger Mac ransomware has roots in Linux, not Windows, as many were expecting to. A big surprise was revealed today by security researchers from Romanian antivirus companyRead More →
Step 1. Simply take over a victim’s mobile phone number. NatWest is tightening up its internet banking systems after security shortcomings were exposed by journalists. BBC hacks were able to hijackRead More →
Federal Reserve officials deny the incident took place. Serious accusations have been made today by Bangladesh’s central bank, which has said that hackers breached its US Federal Reserve account and stoleRead More →
Craig Smith does car hacking as safely as possible. The softly-spoken security researcher doesn’t take risks like cutting cars’ power on public roads, as executed on a Jeep by researchers last year. Indeed,Read More →
ome users might be able to remove KeRanger before it starts its encryption process and locks up all their files. Yesterday, the first ever fully functional ransomware family targeting Maccomputers hasRead More →