Google: We’ll pay $100k if you can hack a Chromebook remotely
Google has doubled its reward for hackers who can breach Chromebooks in a locked-down state known as Guest Mode. Google has put up a $100,000 reward for anyone who can findRead More →
Data Security News | Infosec Blog | Information Security Tutorials
Google has doubled its reward for hackers who can breach Chromebooks in a locked-down state known as Guest Mode. Google has put up a $100,000 reward for anyone who can findRead More →
Today I’m going to tell you about a couple of techniques used to build stealth backdoors. Then, I will also show you how to detect that kind of malware andRead More →
The FBI and the US National Highway Traffic Safety Administration have added their voices to growing concerns about the risk of cars being hacked. In an advisory note it warnsRead More →
Three years after the Snowden revelations, the proliferation of privacy-focused messaging apps, email clients, and other encryption services hasn’t yet managed to make the use of crypto less of aRead More →
During our continued efforts to protect our customers against the latest mobile threats, we came across another malicious app that used pornography to attract users. Noting that 1 in 5Read More →
Security researchers have successfully exploited the Android-based Stagefright bug and remotely hacked a phone, which may leave millions devices vulnerable to attack. Israeli software research company NorthBit claimed it hadRead More →
We’ve discovered a new family of iOS malware that successfully infected non-jailbroken devices we’ve named “AceDeceiver”. What makes AceDeceiver different from previous iOS malware is that instead of abusing enterprise certificatesRead More →
Political dissidents and cyber criminals alike will soon be sending anonymous internet traffic through a library at Western University in Canada, thanks to a new “node” in the encrypted TorRead More →
A China-based APT group has an insatiable appetite for stolen code-signing certificates. Many security-minded organizations utilize code signing to provide an additional layer of security and authenticity for their software andRead More →
Short Bytes: The decentralized hacktivist group Anonymous has again tied their shoelaces to run after the Republican Presidential candidate Donald Trump. In a newly released video, the Guy Fawkes MaskRead More →