How BitTorrent Mitigated DRDoS Vulnerability In previous week we published an article about how it was possible to initiate a BitTorrent DRDoS attack using UDP protocols. In that post security …
NSA Switches to Quantum-Resistant Algorithms As world is getting near to use of quantum computing security agencies are taking a notice. NSA recommends companies and American agencies to be …
Hacking into Air-Gapped Systems takes Hacking Into a Whole New Level Generally speaking, we might think that a system cannot be hacked unless it is connected to a network …
How to Download Ashley Madison Dump? Couple of months ago Ashley Madison (a dating website for cheaters) has suffered a massive breach, leading to stealing private information about its …
Security Zap is online platform for cyber security and information security research and analysis. We provide daily updates about trending issues and help newcomers to advance in a cyber security career. …
Using BitTorrent for DRDoS Attacks Researcher Florian Adamsky, City University London; Syed Ali Khayam, PLUMgrid Inc.; Rudolf Jäger, THM Friedberg; Muttukrishnan Rajarajan, City University London have published an interesting paper demonstrating that …