What are the risks for average users who download content via torrent?

What are the risks for average users who download content via torrent?

Introduction Today, it’s very easy to share any kind of content through simplified file-sharing services, making it easy to obtain copyrighted material and pirated copies of popular applications.... Go on to the site to read the full article ... Read More

Year in Review: Looking Back on Our Top 10 Cybersecurity Predictions for 2018, and Our Predictions for 2019!

2018 was certainly a year for cybersecurity news: high-profile hacks, ransomware attacks, cryptocurrency fluctuations and more. But now the year has ended, so it is time to check whether the... Go on to the site to read the full article ... Read More

Hackers Target Organizations in the Naval and Maritime Sectors

Introduction Companies and infrastructure within the naval and maritime sectors are under attack. In recent years, security experts have observed a growing number of attacks carried out by different... Go on to the site to read the full article ... Read More

Who Is Targeting Industrial Facilities and ICS Equipment, and How?

| | General Security
Industrial Control Systems (ICS) Equipment Under Attack Industrial Control Systems (ICS) are expected to be installed and left isolated for a long time. Technical changes and the necessity of... Go on to the site to read the full article ... Read More

CamuBot Banking Malware Stands out for Its Ability to Bypass Biometric Authentication

| | General Security
A few days ago, security experts from IBM X-Force spotted a new strain of malware, tracked under the name CamuBot and targeting Brazilian bank customers. The malicious code immediately caught the... Go on to the site to read the full article ... Read More

CVE-2018-11776 RCE Flaw in Apache Struts Could Be Root Cause of Clamorous Hacks

| | Hacking
CVE-2018-11776 RCE in Apache Struts At the end of August, maintainers of Apache Struts released security updates for the Apache Struts 2 open-source development framework to address a critical remote... Go on to the site to read the full article ... Read More

WireLurker, Masque: Every Apple iOS App Could Be Compromised

Wrong conviction and bad habits Before the introduction of the Masque vulnerability and related attacks, I desire to contextualize my analysis. The security community is assisting with the rapid rise... Go on to the site to read the full article ... Read More

“Quiet Skies” – A TSA Surveillance Program Targets Ordinary U.S. Citizens

Here we are once more to discuss another surveillance program that could threaten the privacy of U.S. citizens. This time, our topic is the previously-undisclosed “Quiet Skies” program.... Go on to the site to read the full article ... Read More

Leaders’ Meetings: A Privileged Target for Hackers

| | Hacking
Leaders’ meetings are privileged targets for nation-state attackers that launch massive offensives to gather intelligence from the ongoing events. Let’s analyze together what has happened... Go on to the site to read the full article ... Read More
How Much Does a Data Breach Cost? Reading the 2018 Cost of a Data Breach Study

How Much Does a Data Breach Cost? Reading the 2018 Cost of a Data Breach Study

How much does a data breach cost? It isn’t a simple question, but the answer is the only way to transmit the urgency of the situation to C-level executives. The 2018 Cost of a Data Breach... Go on to the site to read the full article ... Read More
Loading...