Cyber security

Ukrainian Government Officially Accuses Russia of Recent Cyberattacks

The government of Ukraine on Sunday formally accused Russia of masterminding the attacks that targeted websites of public institutions and…

Read More »

Get Lifetime Access to Cybersecurity Certification Prep Courses

You can’t go far in professional IT without being asked for some key certifications. In particular, most large companies today…

Read More »

U.K. Hacker Jailed for Spying on Children and Downloading Indecent Images

A man from the U.K. city of Nottingham has been sentenced to more than two years in prison for illegally…

Read More »

Apple Releases iPhone and iPad Updates to Patch HomeKit DoS Vulnerability

Apple on Wednesday rolled out software updates for iOS and iPadOS to remediate a persistent denial-of-service (DoS) issue affecting the…

Read More »

Attackers Can Weaponize Firewalls and Middleboxes for Amplified DDoS Attacks

Weaknesses in the implementation of TCP protocol in middleboxes and censorship infrastructure could be weaponized as a vector to stage…

Read More »

New AdLoad Variant Bypasses Apple’s Security Defenses to Target macOS Systems

A new wave of attacks involving a notorious macOS adware family has evolved to leverage around 150 unique samples in…

Read More »

New Glowworm Attack Recovers Device’s Sound from Its LED Power Indicator

A novel technique leverages optical emanations from a device’s power indicator LED to recover sounds from connected peripherals and spy…

Read More »

Learn Ethical Hacking From Scratch — 18 Online Courses for Just $43

If you’re reading this post, there is a pretty good chance you’re interested in hacking. Ever thought about turning it…

Read More »

Facebook Adds End-to-End Encryption for Audio and Video Calls in Messenger

Facebook on Friday said it’s extending end-to-end encryption (E2EE) for voice and video calls in Messenger, along with testing a…

Read More »

Hackers Spotted Using Morse Code in Phishing Attacks to Evade Detection

Microsoft has disclosed details of an evasive year-long social engineering campaign wherein the operators kept changing their obfuscation and encryption…

Read More »
Back to top button
Close