In Silk Road Appeal, Ross Ulbricht’s Defense Focuses on Corrupt Feds
IT’S BEEN NEARLY a year since a jury determined that Ross Ulbricht had created and run the anonymous black market for drugs known as the Silk Road, a conviction thatRead More →
Data Security News | Infosec Blog | Information Security Tutorials
IT’S BEEN NEARLY a year since a jury determined that Ross Ulbricht had created and run the anonymous black market for drugs known as the Silk Road, a conviction thatRead More →
A new type of black hat SEO campaign has been uncovered in the last few months by Akamai’s experts, who have observed that an attacker is using SQL injection flawsRead More →
Fortinet’s FortiOS operating system, deployed on the company’s FortiGate firewall networking equipment includes an SSH backdoor on versions from the 4.x series up to and including 4.3.16, and the 5.xRead More →
Security experts at Heimdal Security are warning a spike in cyber attacks leveraging the popular Neutrino and RIG exploit kit. Cyber criminals always exploit new opportunities and users’ bad habits, nowRead More →
A new type of RAT (Remote Access Trojan) has been discovered in use against governments and civil society organizations in South-East Asia, the Arbor Security Engineering & Response Team (ASERT)Read More →
CBS endangered cyber-procedural: Plane hacking! Software defined radio! White noise! OMG!. There are lots of cringeworthy technology moments on television, especially when the words “hacking” and “cyber” are introduced into theRead More →
Wearable devices can be used as motion-based keyloggers. French student and software engineer, Tony Beltramelli, has published his master thesis called Deep-Spying: Spying using Smartwatch and Deep Learning, in which heRead More →
Researchers contradict Juniper claim that Dual_EC_DRBG weakness couldn’t be exploited. Juniper Networks, which last month made the startling announcement its NetScreen line of firewalls contained unauthorized code that can surreptitiouslyRead More →
When it comes to securing homes and businesses, a security camera is a privileged solution but it paradoxical is exposing users to further risks. A new study made by researchersRead More →
Tech industry hits back at plans to create legal framework for hacking by spies, military and police. Tech companies including Apple, Microsoft, Google and Facebook have criticized plans by theRead More →