Archive for February 2015
Critical Vulnerability discovered in the Ultra Secure BlackPhone

A critical vulnerability discovered in the ultra secure BlackPhone has given attackers the ability to decrypt and read messages, read contacts, monitor geographic locations of the phone, write code or text to the phone's external storage, and enumerate.
Cyber Crime Hacker

Now a days, any mention of malware and Macs in the same setting generally conjures up images of WireLurker. It was notable as a new family of malware specifically targeting iOS devices via USB and is able to penetrate the iPhone's strict software controls.
WireLurker.
Google’s Project Zero gets tough on companies with lax security patch policies

Google Inc. has a elite team of hackers and programmers called Project Zero so named after the “zero day” security flaws that are exploited before developers learn of them.
Project Zero scrubs their own and competitors’ software for security.
Live Map Shows Thousands of Cyber Attacks as They Happen

Sony got nuked, said
one security expert. But it’s hardly the only attack aimed at a major
corporation. Tens of thousands of cyber-attacks are launched every second – a
majority of which are directed at the United States – but few have the impact
that.
Trojans, Viruses and Worms

Introduction:
Computers
have become mandatory to run a successful businesses. It is not enough to have
isolated computers systems; they need to be networked to facilitate
communication with external businesses. This exposes them to the outside world
and.