Attackers have been using social engineering to avoid the increasing costs of exploitation due to the significant hardening and exploit mitigations investments...
LAS VEGAS–Microsoft’s Windows 10 includes many innovative security features that are intended to help minimize risk and improve user experience. One such...
Short Bytes: A security researcher has claimed that the newly-introduced Linux subsystem in Windows 10 could prove to be a risky affair by...
Neutrino EK now features support for CVE-2016-0189. The crooks behind the Neutrino Exploit Kit (EK) didn’t wait long to update their automated malware...
Short Bytes: A combined research has been conducted by UC Berkeley and Georgetown University to demonstrate how distorted voice commands hidden in YouTube...
Some attacks are hard to spot even by human subjects. A series of distorted voice commands surreptitiously hidden in YouTube videos can force...
Short Bytes: Thanks to Euro 2016 season, Facebook has rolled out a new easter egg in the form of Messenger Football. All...
An interesting DNS hijack that sets the victim's computer to use specific DNS servers has emerged. Here are the key details of...
Researchers say 70,000 servers belonging to others also at risk. Dozens of HTTPS-protected websites belonging to financial services giant Visa are vulnerable to...
In this article, we will be looking at the strategies to detect and analyze malware hidden inside an OPcache file. If you...
Short Bytes: Using a hidden user administrator account on Windows 10, you can ensure the privacy of your personal data very easily....
Following WhatsApp’s move to add end-to-end encryption to its platform, another big messaging company is joining the wave of apps turning on expanded privacy features.Viber...
ShortBytes: In a recent find out, it has been revealed how NSA implants trojan firmware in the networking devices being delivered to...
One of the most complex tasks for the cybercriminals is to ensure their malicious code goes undetected by antivirus and achieves its...
Short Bytes: The stereotypes associated with programmers are countless. To study them, using Microsoft’s Face API, Trestle Technology has performed a survey that...
What’s driving the surge in hidden services—is it government tampering? In recent weeks, the number of “hidden services”—usually Web servers and other Internet...
Unprotected HP printer HDDs can be abused if not protected. Security researcher Chris Vickery has discovered that HP LaserJet printers may be abused...
Highly privileged account could be used to hack customers’ networks, researchers warn. A company that supplies audio-visual and building control equipment to...
Short Bytes: Call it a bug or an updated feature of the Google maps, now with the updated version of Google maps,...
Here’s a trick that’s been around for a while but may have passed you by: secret category codes added by Netflix engineers...
A lot of people think that TOR services are unhackable because they are on a “secure environment”, but the truth is that...