Researchers have found several authentication and encryption vulnerabilities in the firmware of marine diesel engine controllers by Norwegian company Auto-Maskin, as well as the accompanying Android app. These security flaws could be exploited by attac…Continue Reading
Apple iPhones are under attack from crypto-mining malware. This is according to Israeli-based cyber security firm Check Point Software Technologies in its Global Threat Index for September 2018, which reveals a near-400% increase in crypto-mining malwa…Continue Reading
A US court has sentenced a programmer to 30 months in a federal prison in connection with software that claimed to be a legitimate tool for Windows sysadmins to remotely manage computers, but was actually used by criminals to backdoor PCs and secretly …Continue Reading
#1233529: MartyMcFly Malware: new Cyber-Espionage Campaign targeting Italian Naval Industry. Yoroi security firm uncovered a targeted attack against one of the most important companies in the Italian Naval Industry leveraging MartyMcFly Malware. Today …Continue Reading
Users inadvertently fall into fraudulent or unreliable sites. Experts in digital forensics report the emergence of a search engine optimization (SEO) pollution campaign directed against the keywords associated with the midterm elections in the United S…Continue Reading
Are you uncomfortable with the thought that some of your sensitive data is sitting on a remote server that represents a big, juicy target for hackers ? Helm thinks it has a solution: put that data inside your home. It’s launching a namesake personal se…Continue Reading
The flaw affects thousands of servers; but GitHub, a major libssh user, is unaffected.
The libssh open-source project has issued an update to address an authentication bypass vulnerability in the server code — to say that it’s trivial to exploit is an…Continue Reading
When it comes to protecting yourself and your organization against cyber scams, there’s no “one-size-fits-all” solution. As organizations and people alike continue to adopt new devices and technology, they’re opening themselves up to more opportunities…Continue Reading
imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basically in ROT13 with new multi encryption based algorithm on ASCII and Symbols Substitution.
How To Use It’s simple…Continue Reading
Leaked data tranche of 8,700 documents purportedly includes tools that turn smart TVs into covert surveillance devices.
In what appears to be another major blow against a U.S. intelligence agency, whistleblower website WikiLeaks has publicly leaked 8,…Continue Reading