network attacks
-
Stack Overflow hits the hacker face, no significant damage is recorded
in a brief report released earlier today, stack overflow has reportedly recorded an attack that led hackers to successfully access their production systems.
-
The unsafe 'feature' on UC Browser allows hackers to take control of Android phones remotely
watch! if you are constantly using uc browser as the main browser on your smartphone, now is the time to carefully consider uninstalling it immediately.
-
Windows, Android and security intelligence issues
with 4.312 billion users worldwide, ie equivalent to about 55.6% of the global population, the internet has been and will become a daily 'living space' for most events and activities. human.
-
Fileless malware - Achilles heel of traditional antivirus software
by the definition of being unified and widely recognized by many industry-leading security experts, the malware fileless is the type of malicious code that does not write malicious executable files to the file system.
-
The alarming increase in the number of attacks targeted at IoT devices
along with the explosive growth of globalized internet and especially wireless connectivity, the number of attacks targeted internet devices and things (iot) has escalated 'scary. 'throughout 2018.
-
New ransomware detection not only encrypts files but also helps 'clean up' the system
rxomware vxcrypter is the first ransomware in the world that not only encrypts the victim's data but also helps clean up their computers by deleting duplicate files on the system.
-
Reveal personal data of more than 1.3 million people from a vulnerability in web application
georgia tech (georgia institute of technology) - one of the largest us education institutions, has announced the discovery of a serious data breach targeting its system, affecting nearly 1.3 million people.
-
Discover Dragonblood security vulnerability in WPA3
security researchers have recently discovered several new security flaws in the wpa3-personal protocol, allowing potential attackers to unlock wi-fi network passwords.
-
The hyperlink test command is being used by hackers to perform DDoS
researchers have recently discovered that an html feature is called a hyperlink auditing, or ping for short, being used by hackers to execute ddos attacks. target multiple websites.
-
Google urged Chrome users to update the new version immediately to fix the vulnerability
immediately after reading this article, you must remember to update your google chrome immediately to the latest version!
-
Application protection against DFA attacks
differential fault analysis, also known as dfa, is an attack technique designed to recover cryptographic keys from the application ...
-
New phishing attacks appear to use Google Translate as a disguise
recently, a phishing campaign to steal google accounts and facebook login information has been discovered using google translate (google translate) as a disguised location on mobile browsers.