Posts Tagged ‘attackers’

Androids Vulnerable Hijacking Attacks

Attackers can exploit an Android vulnerability discovered a year ago to trick users into downloading malicious apps from third-party stores,
Read More.

Phishing gets a Bit Easier

A new technique is coming into play by attackers which allow them to fool even more users into believing they
Read More.

APT: In Action for Six Years

The “Pitty Tiger” advanced persistent threat (APT) group may have been active for over six years, researchers said. The activities
Read More.

How Attackers Bypass Security: Report

Attackers are exploiting commonly-used business applications to bypass security controls, a new report said. Common sharing applications such as email,
Read More.

Apps Lack of Security

As more companies focus on mobility, it is no real surprise the lack of security on devices continues to be
Read More.

Malware Reuses Old Technique

The use of the right-to-left override (RLO) character in Unicode, a tactic that enables malware authors to hide the real
Read More.

Hackers Hit Cloud for Android Attacks

A “loophole” in Google Cloud Messaging (GCM) lets attackers control some nasty Android Trojans. Cyber criminals use Google Cloud Messaging,
Read More.

Backdoors Embedded into Image Files

Attackers are using a known, but uncommon method of maintaining access to an already compromised server by hiding backdoors inside
Read More.

Professors: Changing Security Attitude

With all the public incidents where hackers attacked various organizations, it is still apparent companies do not prioritize cyber security
Read More.

Breach Discovery: 10 Hours

Security usually ends up being a matter of vigilance, so the longer it takes to understand the system is under
Read More.

 
 
Archived Entries