How to Connect Android to PC/Mac Without WiFi
Quite a few times, you might need to display Android screen on your PC or Mac to to play games, stream video music, demonstrate the tutorials, share photos by controllingRead More →
Data Security News | Infosec Blog | Information Security Tutorials
Quite a few times, you might need to display Android screen on your PC or Mac to to play games, stream video music, demonstrate the tutorials, share photos by controllingRead More →
Someone hijacked the Transmission BitTorrent client project website to spread ransomware to Mac OS X users. Over the weekend, a malicious party has managed to hack the Transmission BitTorrent client forRead More →
The resurgence and continued prevalence of macro malware could be linked to several factors, one of which is their ability to bypass traditional antimalware solutions and sandboxing technologies. Another factor is the continuousRead More →
Short Bytes: History of hacking always fascinates us as it tells us about the best hackers from the earlier times. But is not interesting to know that what they didRead More →
What’s driving the surge in hidden services—is it government tampering? In recent weeks, the number of “hidden services”—usually Web servers and other Internet services accessible by a “.onion” address on theRead More →
Last summer we shared a story about the SweetCaptcha WordPress plugin injecting ads and causing malvertising problems for websites that leveraged the plugin. When this plugin was removed from the officialRead More →
A group of researchers that analyzed security of a number of smart watches discovered a $17 smartwatch is sold with a backdoor in the pairing app. Be careful of cheap smartwatchRead More →
Sea pirates hire hacker to break into shipping company’s CMS. A curious case reported by Verizon’s RISK Team shows that even those lowly sea pirates chasing after cargo ships with oldRead More →
WinRT PDF exposes users to drive-by attacks. WinRT PDF, the default PDF reader for Windows 10, opens Edge users to a new series of attacks that are incredibly similar to howRead More →
Locky is a new ransomware that has been released (most probably) by the Dridex gang (source). Not surprisingly, it is well prepared, which means that the threat actor behind itRead More →