Blog

Hackers of Russia Stole NSA’s Secrets using Kaspersky antivirus

The report may well be valid, but, for now, there’s no way to individually confirm it. The statement is based on unnamed personalities the...

Uber App Can Record iPhone Screens accessing Core Functionality in Apple’s iOS

The presence of Uber’s access to exclusive iPhone functions is not published in any consumer-facing data included with Uber’s app, notwithstanding giving the corporation direct...

Vault 7 Leaks – inside the CIA secret kingdom (July-August 07)

Introduction Let’s continue to analyze the information contained in files leaked by the organization Wikileaks and allegedly originating from a network of the U.S. Central...

Innovative Methods of Information Security Training

Section 1. Introduction More and more organizations providing information security training apply integrative training, i.e., designing training programs that combine traditional classroom training with e-learning...

FormBook—Cheap Password Stealing Malware Used In Targeted Attacks

It seems sophisticated hackers have changed the way they conduct targeted cyber operations—instead of investing in zero-days and developing their malware; some hacking groups...

Greek Court Approves US Extradition of BTC-e Operator In $4 Billion Money Laundering Case

A Greek court has approved the U.S. extradition of a 38-year-old Russian national accused of laundering more than $4 billion in bitcoin for culprits...

Apache Tomcat Patches Important Remote Code Execution Flaw

The Apache Tomcat team has recently patched several security vulnerabilities in Apache Tomcat, one of which could allow an unauthorised attacker to execute malicious...

Popular Articles

How to Find Reflected Cross Site Scripting Vulnerability

In our earlier tutorial, now we have realized about Reflected Cross Site Scripting and three fundamental steps to establish and detect Reflected Cross Site...