In the previous article we discussed the new PolloCrypt, Breaking Bad ransomware and showed you how it works. But today we provide you with the…
How to Protect Yourself from LogJaM Vulnerability
Introduction A Logjam vulnerability has been uncovered yesterday. The Logjam flaw, just like FREAK, is present in TLS (Transport Layer Security protocol) that is responsible…
Pollocrypt New Breaking Bad Ransomware
Ransomware is a type of malicious software that encrypts the data on a victim’s computer and demands payment in order to decrypt it. Pollocrypt New…
PuTTY SSH Client Contains Trojan and Steals Information
Putty holds important place in system administrator’s toolkit as it allows encrypted connection to remote servers. But today Putty ssh client injected with trojan appeared…
NetUSB Bug Makes Millions of Routers Vulnerable
Carnegie Mellon University CERT uncovered important security flaw in KCode NetUSB. NetUSB is a Linux kernel module of small Taiwanese company KCodes that adds USB over IP…
ESET Free Purchase Vulnerability
ESET vulnerability has been uncovered by Egyptian geeks. This authentication bug allowed a security researcher to generate millions of valid licenses for NOD 32 antivirus…