19 C
Texas

SHOWING RESULTS FOR:

Fauxpersky – Efficient, but Not Sophisticated Malware

In the world of malware, every hacker is trying to create better and improver malware that can take the advantage of the hidden security...

LibreOffice Alternatives for Linux Users

If you’re a Linux user, then LibreOffice is one of the most obvious choices. LibreOffice is one of the best Office suite available in...

New Android Malware – FakeBank (improved)

Malware is the worst types of programs that are used to spy on others’ systems via illegal access. As Android is the most popular...

Pwn2Own 2018 – The Hacking Contest

Hacking is an essential part of every day’s security. Don’t you believe it? Well, offense is the best defense. You have to know how...

AMD Chips – Busted with 13 Vulnerabilities!

AMD is one of the largest chipset production companies. In fact, AMD has all the right to compete with the giant chipset producer –...

Kotlin – Now on Linux!

Kotlin is one of the newest and most powerful programming languages of the world. This is a statically typed programming language that can create...

How to Mitigate DDoS from Memcached Servers

Recently, the frequency of DDoS has reached sky-high. Thanks to the availability of Memcached servers, attackers were able to launch DDoS of ~1 terabit/s!...

Android P – All the New Features

Android is, by far, the most popular operating system for smartphones. Google released the latest version Android Oreo (8.0) not very long ago. It’s...

SgxSpectre – Improved Spectre Exploit Revealed

The Spectre is one of the most critical bugs of the modern processors that’s really hard to defend against without hardware upgrade. Although system...

Tesla Cloud Account Data Breached!

According to the security company RedLock, hackers hacked a Tesla account on AWS (Amazon Web Service) using an unsecured Kubernetes container management console. The...

Latest news