- Hackers can use Ransomware to attack and control robots

ioactive, an american security consulting firm, recently launched an attack to prove that hackers can not only use ransomware to attack computers to make ransom, but also attack complex robot systems. are being used in many areas.
- Four Windows vulnerabilities can be exploited in the perfect attack chain

the vulnerabilities include: 2 remote code execution errors, 1 privilege escalation error and 1 secure boot security feature bypass error. under ideal conditions, hackers can combine 4 vulnerabilities to form a perfect attack chain.
- How does malicious code break into user PC (Part 2)

the previous article detailed how aggressive hackers infect malicious code and can see that these are extremely dangerous attack techniques.
- What is SS7 attack? What can hackers use it for?

an ss7 attack is a very dangerous attack method. an ss7 attack can be used to bypass two-factor authentication. so what specifically is the ss7 attack? what can a hacker do with an ss7 attack?
- Vista suffered the first attack

just a week after the launch of microsoft windows vista suffered the first attack by hackers. however, vista is just a victim of abuse in this attack, not a target.
- Discovering a large-scale APT attack into Vietnam, users need to quickly download the malicious tool

the department of information security recommends that users urgently download this malicious code-checking and removal tool on ais.gov.vn; vncert.vn was built and provided by the department.
- The source code of Windows 10 is revealed by hackers on the network

according to register, microsoft's exclusive, proprietary windows 10 code compiler has been leaked online.
- What is Smurf Attack? How to prevent Smurf Attack?

smurf attack is a type of ddos attack, hackers will attack the victim's server by sending fake ip requests using internet control message protocol to create fake accesses that overload the target device or network.
- Test knowledge about hacking

this is a short educational questioning package that aims to give you some techniques that hackers use and help you protect your code from attack. you will be provided with the correct answer with detailed explanation after you have completed all the questions.
- How to protect your computer from Thunderspy attack

thunderspy is a security attack technique on hardware devices and the article will guide tips against it.