GCHQ have designed built-in backdoors to allow snooping
An aerial image of the Government Communications Headquarters (GCHQ) in Cheltenham, Gloucestershire. GCHQ is one of the three UK Intelligence...
An aerial image of the Government Communications Headquarters (GCHQ) in Cheltenham, Gloucestershire. GCHQ is one of the three UK Intelligence...
So I have had my kippo honeypot running for a while and got some pretty good statistics from it. But...
So we have all heard about the recent DDoS attack on ProtonMail over the...
ProtonMail, the secure encrypted email service in Switzerland have been having bad time recently. ProtonMail, an encrypted email provider, has...
In total 4% of the customer base had personal data compromised. The cyber-attack on TalkTalk was successful on a...
So it seems there is a Fitbit vulnerability involving the BlueTooth implementation that can be used to embed self replicating...
Recently, enSilo found an Advanced Persistent Threat (APT) residing in a sensitive network of a customer. This APT appears to...
A malicious DLL was able to read & log passwords in clear text An attack exploiting the Microsoft Outlook Web...
SYMANTEC is reporting about Linux.Wifatch They are suggesting that it might be a good guy type of internet threat that wants to...
The XOR DDoS botnet can generate attacks more powerful than most businesses can withstand A Linux botnet has grown so powerful...
Kippo! Great honeypot..... But there are problems, i mean 2 seconds with metasploit and BAM! honeypot detected! Then there are...
This is just an update for anyone else wondering. There seems to be issues with twitter.com But it seems the...
So I have recently setup a kippo honeypot, let me show you how I setup my DMZ ready for the...
Wow, did you know there was a 3D mode in Firefox ? You did? Ah well I didn't know until...
Sleepy Puppy is a XSS payload management framework that enables security engineers to simplify the...
Browsefox aka Sambreel aka Yontoo is a family of browser hijackers. When advertised they promise to “customize and enhance your...
This is the second "critical" out-of-band patch issued in as many months. It's all Internet Explorer's fault -- again. Microsoft...
For 2 years VW tried to hide the exploits that made its cars hack-able . Now, many might be getting...
Lenovo has sold laptops bundled with irremovable software that features a bonus exploitable security vulnerability. If the crapware is deleted,...
Update flawed, new one needed for countless gadgets Google's security update to fix the Stagefright vulnerability in millions of Android...
A team of European security researchers has published a paper analyzing how the battery life of mobile devices could be used to track web...
We’re still buzzing and recovering from the Black Hat and DEF CON conferences where we finished presenting our new Kali...
Same origin violation and local file stealing via PDF reader Security researcher Cody Crews reported on a way to violate...
Six WordPress security bugs fixed in version 4.2.4 WordPress, the darling CMS of the open source community, has released moments...