, one thing that it still needs to work on is ensuring that customers trust it. Just last year, , which allowed fake APKs to be installed on Android devices. To quell those fears, the company has detailed how it secures user accounts and the steps that…Continue Reading
Russian Hackers Use RATs to Target Financial Entities.
A financially motivated threat actor believed to speak Russian has used remote access Trojans (RATs) in attacks on financial entities in the United States and worldwide, Israel-based security firm…Continue Reading
Redhat JBoss Web Server 3.1 for RHEL 7 Redhat JBoss Web Server 3.1 for RHEL 6 Redhat Enterprise Linux Workstation Optional 7 Redhat Enterprise Linux Workstation 7 Redhat Enterprise Linux Workstation 6 Redhat Enterprise Linux Server Optional 7 Redhat En…Continue Reading
Researchers discovered a recent malvertising campaign from eGobbler threat actor that targets millions of iOS users to hijack their sessions by leverage chrome vulnerability. Attackers trick the targeted iOS users to redirect into Malicious lading page…Continue Reading
Cisco has issued a security patch for a flaw in some of its routers that can be exploited by miscreants to potentially rifle through telecommunications networks. Switchzilla says the vulnerable kit – the ASR 9000, a family of high-end gear aimed at car…Continue Reading
Internet domain registrars and at least one registry were hijacked to change certain websites’ DNS settings so that visitors to said sites were in fact directed to password-stealing phishing pages, researchers detailed on Wednesday. It is believed this…Continue Reading
Further, according to Ortiz, by mixing in with protected health information malware can effectively exploit the data’s clinical and regulatory implications to evade detection. Because of stringent privacy regulations in HIPAA regulations, medical devic…Continue Reading
News and articles about cyber security, information security, vulnerabilities, exploits, patches, releases, software, features, hacks, laws, spam, viruses, malware, trojans.
Original release date: April 17, 2019. Cisco has released a security update t…Continue Reading
specialist from the International Institute of Cyber Security (IICS) a cybercriminal group identified as eGobbler has been exploiting a vulnerability in
for iOS operating system for the purpose of attacking the iPhone device users with an exploit that…Continue Reading
I’m not a huge fan of stories about stories, or those that explore the ins and outs of reporting a breach. But occasionally I feel obligated to publish such accounts when companies respond to a breach report in such a way that it’s crystal clear they w…Continue Reading