Archive for February 2015

Critical Vulnerability discovered in the Ultra Secure BlackPhone

A critical vulnerability discovered in the ultra secure BlackPhone has given attackers the ability to decrypt and read messages, read contacts, monitor geographic locations of the phone, write code or text to the phone's external storage, and enumerate.
Friday, February 27, 2015
Posted by Anonymous

Cyber Crime Hacker

Now a days, any mention of malware and Macs in the same setting generally conjures up images of WireLurker. It was notable as a new family of malware specifically targeting iOS devices via USB and is able to penetrate the iPhone's strict software controls. WireLurker.
Thursday, February 26, 2015
Posted by Anonymous

Google’s Project Zero gets tough on companies with lax security patch policies

Google Inc. has a elite team of hackers and programmers called Project Zero so named after the “zero day” security flaws that are exploited before developers learn of them. Project Zero scrubs their own and competitors’ software for security.
Tuesday, February 24, 2015
Posted by Unknown

Live Map Shows Thousands of Cyber Attacks as They Happen

Sony got nuked, said one security expert. But it’s hardly the only attack aimed at a major corporation. Tens of thousands of cyber-attacks are launched every second – a majority of which are directed at the United States – but few have the impact that.
Monday, February 23, 2015
Posted by Unknown

Trojans, Viruses and Worms

Introduction: Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and.
Tuesday, February 3, 2015
Posted by Unknown

Total Pageviews

- Copyright © 2025 REDBACK COUNCIL - RISC -- Powered by Redback - Designed by Redback Council -