SHOWING RESULTS FOR:
Fauxpersky – Efficient, but Not Sophisticated Malware
Mel -
In the world of malware, every hacker is trying to create better and improver malware that can take the advantage of the hidden security...
LibreOffice Alternatives for Linux Users
Mel -
If you’re a Linux user, then LibreOffice is one of the most obvious choices. LibreOffice is one of the best Office suite available in...
New Android Malware – FakeBank (improved)
Mel -
Malware is the worst types of programs that are used to spy on others’ systems via illegal access. As Android is the most popular...
Pwn2Own 2018 – The Hacking Contest
Mel -
Hacking is an essential part of every day’s security. Don’t you believe it? Well, offense is the best defense. You have to know how...
AMD Chips – Busted with 13 Vulnerabilities!
Mel -
AMD is one of the largest chipset production companies. In fact, AMD has all the right to compete with the giant chipset producer –...
Kotlin – Now on Linux!
Mel -
Kotlin is one of the newest and most powerful programming languages of the world. This is a statically typed programming language that can create...
How to Mitigate DDoS from Memcached Servers
Mel -
Recently, the frequency of DDoS has reached sky-high. Thanks to the availability of Memcached servers, attackers were able to launch DDoS of ~1 terabit/s!...
Android P – All the New Features
Mel -
Android is, by far, the most popular operating system for smartphones. Google released the latest version Android Oreo (8.0) not very long ago. It’s...
SgxSpectre – Improved Spectre Exploit Revealed
Mel -
The Spectre is one of the most critical bugs of the modern processors that’s really hard to defend against without hardware upgrade. Although system...
Tesla Cloud Account Data Breached!
Mel -
According to the security company RedLock, hackers hacked a Tesla account on AWS (Amazon Web Service) using an unsecured Kubernetes container management console. The...