Apple iOS Malware Is Your Worst Enemy Recently discovered Apple iOS malware has allowed hackers to steal login credentials of more than 250,000 Apple accounts,…
Category: Threat
How BitTorrent Mitigated DRDoS Vulnerability
How BitTorrent Mitigated DRDoS Vulnerability In previous week we published an article about how it was possible to initiate a BitTorrent DRDoS attack using UDP…
Hacking into Air-Gapped Systems
Hacking into Air-Gapped Systems takes Hacking Into a Whole New Level Generally speaking, we might think that a system cannot be hacked unless it is…
How to Download Ashley Madison Torrent?
Torrents, also known as peer-to-peer file sharing, are a type of distributed network that allows multiple users to upload and download files from one another….
Initiating BitTorrent DRDoS Attacks
Using BitTorrent for DRDoS Attacks Researcher Florian Adamsky, City University London; Syed Ali Khayam, PLUMgrid Inc.; Rudolf Jäger, THM Friedberg; Muttukrishnan Rajarajan, City University London have published an…
Three SAP Vulnerabilities You Need to Patch Right Now
Three SAP Vulnerabilities You Need to Patch Right Now If you are using SAP mobile than your private information is at risk even if it is…
