You Think Your Brand-New Phone Is Safe? Check Twice We as consumers have a conception that if our device is new it is safe to…
SECURITY QUIZ – How Secure Are You?
[SECURITY QUIZ] How Secure Are You? Ever thought how easy it might be to hack your online presence, to steal your passwords, financial data and…
Apple iOS Malware Is Your Worst Enemy
Apple iOS Malware Is Your Worst Enemy Recently discovered Apple iOS malware has allowed hackers to steal login credentials of more than 250,000 Apple accounts,…
How BitTorrent Mitigated DRDoS Vulnerability
How BitTorrent Mitigated DRDoS Vulnerability In previous week we published an article about how it was possible to initiate a BitTorrent DRDoS attack using UDP…
NSA Switches to Quantum-Resistant Algorithms
NSA Switches to Quantum-Resistant Algorithms As world is getting near to use of quantum computing security agencies are taking a notice. NSA recommends companies and…
Hacking into Air-Gapped Systems
Hacking into Air-Gapped Systems takes Hacking Into a Whole New Level Generally speaking, we might think that a system cannot be hacked unless it is…
