Online bank accounts are among the most favorite of targets for all hackers, as per a recent survey report. A report published by Positive Technologies (a global provider of enterprise…
Read MoreOnline bank accounts are among the most favorite of targets for all hackers, as per a recent survey report. A report published by Positive Technologies (a global provider of enterprise…
Read MoreAccording to thehackernews, RedTeam Pentesting GmbH, a German network security company, discovered that there is a serious remote code execution vulnerability (CVE-2018-9843) in the CyberArk Enterprise Password Vault application. This…
Read MoreGuess what the favorite tool of hackers is when they want to infect Linux servers with crypto mining malware. It’s a 5-year-old security vulnerability that is being exploited in the…
Read MoreA Tinder user’s phone number- that’s all that a hacker could need, to take over the account itself, as per recent reports on a newly detected Tinder vulnerability. Anyhow, it’s…
Read MoreBanks across the world spend a lot of time and money to protect the information of their customers. An irony, the easiest way for hackers to get information is through…
Read MoreReports say that there has been a 31 percent increase in the number of software vulnerabilities in 2017 compared to 2016 and also that one-third of these have public exploits…
Read MoreGoogle has now detected a new vulnerability in Microsoft Edge, the Windows 10 default web browser; this detection has been made as part of Google’s Project Zero program. On MSFT,…
Read MorePOS (Point-of-Sale) systems are always among the favorite targets of hackers; POS terminals always provide them the chance to lay their hands on all kinds of data- credit card data,…
Read MoreGuess what? YouTube ads that use Google’s double-clicking service have lately turned into a tool that facilitated hackers to mine cryptocurrency. Lately, Cryptocurrencies has been in the news for all the…
Read MoreWhat is Distributed Denial of Service Attack(DDoS)? A distributed denial-of-service (DDoS) attack is an attempt to make a system or network resource unavailable to its intended users. Although the means…
Read More