Tuesday, September 17, 2019
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST
Home Uncategorized

Uncategorized

Traffic Correlation Attacks against Anonymity on Tor

Sep 6, 2013, 11:30 am EST The researchers led by Aaron Johnson of the Naval Research Laboratory published the paper on Traffic Correlation Attacks against Anonymity on Tor. Anonymity on Tor network is the primary reason for the use of the popular network, hacktivists, whistle...

Why SQL injection is the cybercriminals weapon of choice

Sep 4, 2013, 03:00 pm EST By Michael Sabo, VP of Marketing,  DB Networks Fifteen years on, organizations still struggle with the SQL injection threat. There’s a sinking feeling you get when you realize your databases have been breached, sensitive records compromised, and...

A False Lens of Security

Sep 4, 2013, 02:30 pm EST By Nicole Vincent Fleming Thinking of buying an IP camera to keep an eye on your home or business when you’re away? Or maybe you‘ve already set up a security camera that you can access remotely?...

Reversing Dropbox client code raises security issues

Sep 4, 2013, 11:30 am EST Researchers at last USENIX security symposium presented a new method and consolidated techniques for reversing Dropbox code to bypass Dropbox’s two factor authentication, hijack Dropbox accounts and intercept SSL data. Reversing Dropbox analysis allowed researchers to...

PRISM repercussion on the Tor network accesses

Sep 3, 2013, 11:30 am EST The article proposes the analysis of the impact on the use of the Tor network after the events related to PRISM surveillance program disclosure. The use of Tor Network to preserve user's anonymity and to avoid government...

Cybercrime abuses Facebook paid advertisements

Sep 2, 2013, 11:00 am EST A reading of an interesting study on the criminal abuse of Facebook’s Paid “Sponsor Ads” system to deliver nefarious websites to the users. In the last weeks I presented on an interesting study of the techniques adopted by...

China hit by DDoS attack. The Internet inaccessible for hours

Aug 30, 2013, 11:30 am EST China hit by DDoS attack. The CINIC confirmed that the country suffered a DDoS attack over the weekend causing the Internet inaccessibility for hours. During the weekend China's Internet was taken down by a powerful DDoS attack,...

Poison Ivy still alive … old malware new cyber threats

Aug 29, 2013, 11:30 am EST Security vendor FireEye has published a detailed analysis on the popular Poison Ivy RAT, releasing also a set of tools to analyze infections. Security firm FireEye published an interesting analysis on the popular malware Poison Ivy, a remote access...

Top Five Things You Should Do To Protect Your SmartPhone

Aug 28, 2013, 01:00 pm EST By Gary S. Miliefsky, CISSP®, President www.snoopwall.com While I could suggest you rootkit your device, install IP Tables and Tripwire for your Android smartphone, you might be running an iPhone, a Blackberry or a Windows...

Brain hacking, it’s time to protect our mind from hackers

Aug 28, 2013, 11:00 am EST Brain hacking is the act to read the content of the human brain and modify it, is the technology mature to allow hackers to penetrate our mind? Brain hacking refers the possibility to attack the human brain...

STAY CONNECTED

36,188FansLike
56,025FollowersFollow
Show Buttons
Hide Buttons