In the past few weeks, more or less talented malware authors have resorted to naming their…
Category: Security
Ultrasound Tracking Could Be Used to Deanonymize Tor Users
Ultrasounds emitted by ads or JavaScript code hidden on a page accessed through the Tor Browser…
Attacks on Phones of Bitcoin Moguls Continue with Recent KeepKey Security Breach
On the last day of 2016, KeepKey, a vendor of Bitcoin hardware wallets, has notified users…
MongoDB Databases Held Up for Ransom by Mysterious Attacker
An attacker going by the name of Harak1r1 is hijacking unprotected MongoDB databases, stealing their content,…
MongoDB Databases Held for Ransom by Mysterious Attacker
An attacker going by the name of Harak1r1 is hijacking unprotected MongoDB databases, stealing and replacing…
The Age of Resilience – Security in 2017
Security is one of the few tech sectors that thrives primarily thanks to the cruel intentions…
Android Was 2016’s Most Vulnerable Product
With 2016 officially over, we can crown Android as 2016's product with most vulnerabilities, and Oracle…