The stolen Bitcoin & Litecoin were worth over $5.7 million. Cryptsy, a website for trading Bitcoin, Litecoin, and other smaller crypto-currencies, announced a...
A group of security researchers turned a working webcam into a backdoor allowing attackers to remotely connect themselves with the device. The...
Researchers contradict Juniper claim that Dual_EC_DRBG weakness couldn’t be exploited. Juniper Networks, which last month made the startling announcement its NetScreen line...
FireEye security equipment can be compromised, Google finds. Two security researchers working for Google have discovered a simple method of compromising FireEye security...
Experts at FireEye have discovered a stealthy botnet relying on a backdoor called LATENTBOT has compromised companies around. Experts at FireEye have discovered...
The poorly thought-out and crude surveillance technique could have a devastating effect on the country’s internet security. In less than a month,...
The goal of BDF is to patch executable binaries with user desired shellcode and continue normal execution of the prepatched state. First...
Blackberry is all set to shut down its operations in Pakistan. The statement came from the company after continuing request from the...
Brazilian whacks Arris for easy-t-o-guess default password, fix promised fast. Security bod Bernardo Rodrigues has found a backdoor-within-a-backdoor affecting some 600,000 Arris...
Hackers leak data of over 7,000 officers. Hackers who declined to name themselves hacked the servers of the Brazilian Army, and later leaked...
We’re your servants, says general counsel unconvincingly After spending months pressuring tech companies to add backdoors into their encryption software, the FBI...
A software development kit that has been provided by Baidu (A Chinese search engine) can easily be exploited for installing backdoors on...
Our Remediation and Research teams are in constant communication and collaboration. It’s how we stay ahead of the latest threats, but it...
Researchers identified a flaw in Cisco’s WebVPN — Hackers managed to install backdoors via two methods on the service — This weakness...
Matt Graeber showed the method on performing WMI attacks and its effects, but he didn’t talk much about the details. Therefore, this...
Dozens of successful attacks detected that install malicious code on company portals. Attackers are infecting a widely used virtual private network product...
The world of computer viruses and antivirus solutions is in a constant change, with cyber-crooks evolving their code and cyber-security firms trying...
More than a dozen routers in four countries infected with fully featured implants. Researchers have uncovered active and highly clandestine attacks that...
Microsoft has taken NATO onboard in its program which presents information about vulnerabilities and provides access to source code. A Security Agreement...
It has always been believed that Cisco routers being used in the enterprise environment could be hacked via installation of backdoor firmware,...
A recent survey from Vormetric revealed that people in the United States are OK with the addition of backdoors in their devices/software....