- New virus attacks mobile phones using Symbian OS

security firm f-secure has warned symbian mobile phone users about the latest variant of commwarrior, commwarrior.c, which can be infected via bluetooth, mms and mmc memory cards.
- Analysis of an attack (Part 3)

in part 2 of this series, we have left all the necessary information required for an attack on the victim network. with that note, let's continue with a real attack. this attack follows the transmission of ecommerce
- Facebook application for Nokia E71 / E72

finally, after waiting for many users, the facebook application for symbian s60 3rd has also been launched. initially, the application will support two versions of the e71 and e72 phones using a 320x240 pixel resolution screen.
- What is Smurf Attack? How to prevent Smurf Attack?

smurf attack is a type of ddos attack, hackers will attack the victim's server by sending fake ip requests using internet control message protocol to create fake accesses that overload the target device or network.
- Trojans appear to attack Microsoft Office

security experts have warned of a new trojan that appears to be able to attack an unpatched microsoft office security vulnerability that could allow hackers to hack into computers.
- What is BlueSmack attack?

as people become increasingly connected through technology, the vulnerability of devices to cyberattacks continues to increase. one such threat is the bluesmack attack targeting bluetooth-enabled devices.
- Warning the emergence of ransomware DDoS attack, the scale can be up to 800Gbps

although it is not a new form of attack, ddos has always been considered as the leading threat to organizations and businesses globally.
- What is Teardrop attack?

in a teardrop denial of service (dos) attack, a client sends an incorrect packet of information to a machine and exploits an error that occurs when the packet is reassembled, resulting in a drop in server performance.
- What is a Sybil Attack?

a sybil attack is a type of security threat on an online system where a person tries to take over the network by creating multiple accounts, nodes, or computers.
- What is Replay Attack? How to Prevent It Effectively

replay attack is also known as replay attack. this is a network attack method in which the attacker records and reuses valid communications between two parties to perform fraudulent actions.