Bltooth Vulnerability Threatens

Allegedly, the Bluetooth Special Interest Group (SIG) and CERT Coordination Center at the Carnegie Mellon University (CERT/CC) have distributed security alarms with respect to...
VoIP

New CDRThief Linux Malware Steals Call Details from VoIP Softswitch Systems

A new kind of Linux malware dubbed "CDRThief" has been discovered by Cybersecurity researchers that target voice over IP (VoIP) Softswitches in an attempt...

Magento online stores hacked

More than 2,000 Magento online stores have been hacked throughout the end of the week in what security specialists have portrayed as the "biggest...

Netwalk Ransomware Hit Pakistani Electricity Provider

Pakistan's K-Electric private force utility, hit by Netwalker ransomware that prompted the interruption of charging and online master administrations. K-Electric is the sole power supplier...

Instagram retained user deleted photos and private messages even after deletion

A researcher discovered that Instagram retained photos and private direct messages on its server even after deletion, as per an online report. A bug...

Setup Proxychains in Linux

What is Proxychains? Proxychains is a tool that forces any TCP connection made by any given application to go through proxies like TOR or any...

Google App Contains Joker Malware : Removed

Security scientists from Pradeo found Joker malware flooding the Play Store mimicking different applications. As uncovered through their post, they discovered six distinctive Android...

Ransomware Attack at Argentina Borders

Government authorities in Argentina are declining to haggle with a ransomware bunch that constrained them to quickly close all movement checkpoints on Aug. 27. As...

Cyber Security Loop Holes When 2FA Enabled

Cybersecurity resembles a round of whack-a-mole. When the heroes shut down one kind of assault, another springs up. Usernames and passwords were once adequate to...

Anubis Windows Malware

Apparently, Microsoft Security Intelligence (MSI) has gotten another malware in the wild focusing on Windows. Distinguished as Anubis, this malware is fundamentally an information...

Follow Us Here!

372FansLike
332FollowersFollow
323FollowersFollow

Popular Posts