Cyber-security researchers are warning owners of Joomla and WordPress websites of a malicious redirect script that is pushing visitors to malicious websites and expose them to various malwares. A renowned cyber-security researcher published a report outlining a rogue hypertext access (.htaccess) injector found on a client website. He reported that the impacted site was...Continue Reading
Aptly timed. Two words that sum up this attack by Iranian hackers on US cyberspace, what with rising tensions between the United States and Iran. A couple of days ago, the website for the Federal Depository Library Program (FDLP) was defaced by hackers based in Iran, shortly after the killing of Qassem...Continue Reading
The Mozilla Corporation has just patched a couple of zero-day weak points on its flagship browser – Firefox through two separate security updates. While the first zero-day flaw was described as a “remote code execution” vulnerability that enabled remote attackers to run a malicious code within the native process of the Firefox browser, the second...Continue Reading
If your paycheck hits your bank account through direct deposit, be on the lookout for emails requesting personal information including log-in credentials — they could be a phishing scam by hackers who want to access your bank account. The Federal Bureau of Investigation (FBI) has released a warning in regards to hackers targeting direct...Continue Reading
Just to have an overview of what exactly a cheap PC might be like – Raspberry Pi is a teeny-tiny device that can be tinkered with to gain deceptively high capabilities. This was demonstrated by a most recent report which confirmed that a NASA lab was hacked using a Raspberry Pi. The alleged data...Continue Reading
With each passing day, cases of WordPress infection that redirects visitors to suspicious pages is getting common. Recently, a vulnerability was discovered in tagDiv Themes and Ultimate Member Plugins. In this WordPress redirect hack visitors to your website are redirected to phishing or malicious pages. In this hack, users, when redirected, are taken to...Continue Reading
Cybersecurity scientists have found a basic weakpoint in the broadly utilized SQLite database programming that uncovered billions of deployments to cyber criminals. Named as ‘Magellan’ by security researchers, the newfound SQLite imperfection could enable remote assailants to execute self-assertive or malignant code on influenced gadgets, spill program memory or crash applications. SQLite is...Continue Reading
Cyber criminals area at it again. And this time, they are after familiar territory – using ZeroFont on Microsoft Office 365. Ever since the developments in security for messaging systems, security experts have already given us due notice regarding the possible threats of bogus or fraudulent emails. This will be an ever-growing hazard since in...Continue Reading
A man aged 20 from Dublin, was arrested and brought before the High Court on Thursday on foot of an extradition warrant. During a brief appearance, he indicated he understood the charges. He was remanded in custody until May 22. The US Attorney General for the Eastern State of Michigan said that their investigation had...Continue Reading
One seriously threatening part about data breaches and getting hacked is the period from when the breach was done, and the actual time it takes for the end user or the company to find out that they’ve been attacked. You begin to think that from that certain phase, those cyber criminals may have already acquired...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.