Category

Malware Protection
WI-FI Security
Wireless Fidelity We are all connected with it and used it in on daily basis  using computers, smart phones, iPads, game consoles, even our home appliances and other devices to communicate over high-frequency radio signal or wireless signal, however we have less information on how it originally go about, how secure it is and who...
Continue Reading
Sony smart TVs
Security vulnerabilities in Android-based Sony smart TVs allow attackers to access WiFi Passwords and the images stored on the devices.   The vulnerability resides in the Photo Sharing Plus which allows users to upload photos to Sony Smart TV through a smartphone. It affects not only the TV’s used at the home but also the...
Continue Reading
GoDaddy
GoDaddy and Palo Alto recently collaborated to take down some 15,000 subdomains promoting weight-loss products and other goods promising miraculous results. The websites sought to persuade millions of consumers into buying products backed by bogus endorsements purporting to be from celebrities including Stephen Hawking, Jennifer Lopez and Gwen Stefani.   The compromised sites were uncovered...
Continue Reading
Wireless Chipsets Affects Billions of Devices
ThreadX is a real-time operating system (RTOS) developed by Express Logic, capable of running in a rich set of different platforms and devices. It is actually the most deployed RTOS, with over 6.2 billion deployments, including IoT (Internet of Things) devices, modems, laptops such as Samsung Chromebooks and Microsoft Surface, and even gaming consoles like...
Continue Reading
Internet Got Hijacked
A measly Nigerian ISP has hijacked internet traffic meant for Google’s data centers. The incident, called a BGP hijack, occurred last November 12, between 13:12 and 14:35, Pacific Time, according to Google.   The incident was first detected and reported by an online service that monitors the routes that internet traffic takes through the smaller...
Continue Reading
Malware
The infamous Necurs Known for being the multipurpose Necurs botnet wearing different kind of role as its façade was initially introduced as infector and rootkit 7 years ago, and now well known for having partnered with top cybercrime rings and made its name as the top spamming and infection forces in the malware scene. Scaling...
Continue Reading
GPU Channel
PC researchers at the University of California, Riverside have uncovered out of the blue how effectively assailants can utilize a PC’s illustrations handling unit, or GPU, to keep an eye on web movement, take passwords, and break into cloud-based applications. Marlan and Rosemary Bourns College of Engineering software engineering doctoral understudy Hoda Naghibijouybari and post-doctoral...
Continue Reading
BotNet
Security specialists have revealed the noxious exercises of another botnet named BCMUPnP_Hunter. It has just subjugated around 100,000 switches and has been unobtrusively becoming in the course of recent months. The botnet is being utilized to convey enormous email crusades and endeavors to interface with webmail administrations.   The botnet’s administrators were spotted utilizing a...
Continue Reading
Routers Botnet
A recently found botnet has taken control of an eye-popping 100,000 home and little office switches produced by a range of well-known industry manufacturers, for the most part by misusing a basic weakpoint that has stayed unaddressed on tainted gadgets over five years after it became exposed.   Scientists, who detailed the mass contamination before...
Continue Reading
Cameras
There’s no closure to the security bad dream that is the Internet of Things (IoT). Another apparatus created by a security scientist gives you a chance to seek uncertain reconnaissance cameras by essentially entering a location.   Named Kamerka, the apparatus consolidates information of cameras that are associated with the web with area information to...
Continue Reading
1 2 3