Security Zap

Menu
  • Security News
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Deep Web
  • Security News
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Deep Web

How BitTorrent Mitigated DRDoS Vulnerability

Security Zap August 28, 2015
bittorrent drdos ddos
How BitTorrent Mitigated DRDoS Vulnerability In previous week we published an article about how it was possible to initiate a BitTorrent DRDoS attack using UDP protocols. In that post security …
[Continue Reading...]

NSA Switches to Quantum-Resistant Algorithms

Security Zap August 22, 2015
quantum computing
NSA Switches to Quantum-Resistant Algorithms As world is getting near to use of quantum computing security agencies are taking a notice. NSA recommends companies and American agencies to be …
[Continue Reading...]

Hacking into Air-Gapped Systems

Security Zap August 20, 2015
airgapped systems
Hacking into Air-Gapped Systems takes Hacking Into a Whole New Level Generally speaking, we might think that a system cannot be hacked unless it is connected to a network …
[Continue Reading...]

How to Download Ashley Madison Torrent?

Security Zap August 19, 2015
download ashley madison dump
How to Download Ashley Madison Dump? Couple of months ago Ashley Madison (a dating website for cheaters) has suffered a massive breach, leading to stealing private information about its …
[Continue Reading...]

Cyber Security Career at Security Zap

Security Zap August 18, 2015
slider_bg
Security Zap is online platform for cyber security and information security research and analysis. We provide daily updates about trending issues and help newcomers to advance in a cyber security career. …
[Continue Reading...]

Initiating BitTorrent DRDoS Attacks

Security Zap August 18, 2015
bittorrent drdos ddos
Using BitTorrent for DRDoS Attacks Researcher Florian Adamsky, City University London; Syed Ali Khayam, PLUMgrid Inc.; Rudolf Jäger, THM Friedberg; Muttukrishnan Rajarajan, City University London have published an interesting paper demonstrating that …
[Continue Reading...]

Posts navigation

Previous 1 … 81 82 83 84 85 86 87 88 89 90 91 … 102 Next

Popular Posts

  • Windows 7 disc closeup
    Windows 7 Support Is Ending in 2020 – What Should You Do? …
    February 20, 2019 No Comments
    It was too quiet, too calm; one could barely hear …
  • Close up shot of a computer login screen in a modern data center
    Over 770M Email Addresses Leaked Online in Massive Data breach …
    January 29, 2019 No Comments
    In one of the biggest cybersecurity events in 2019 so …
  • Chained hard disc drive with combination padlock. Conception of data security
    How to Use Built-in SSD Encryption on Your PC …
    January 31, 2019 No Comments
    The new company policy wants all your data encrypted… Yes… …
  • Malware concept with male person using smartphone, low key red and blue lit image and digital glitch effect
    How to Remove RogueRobin Malware from Windows PC …
    February 1, 2019 No Comments
    RogueRobin is a Trojan malware that has been recently identified …
  • Browser warning for an unencrypted connection while logged into a website on a laptop. Shallow depth of field.
    Security Researchers Take Down 100,000 Malicious Websites …
    February 2, 2019 No Comments
    This is one major achievement the cybersecurity community can be …

Categories

  • Antivirus
    • Antivirus Review
  • Cyber Attacks
  • Cyber Security News
  • Deep Web
  • General
  • Hacking
  • How to Guide
  • Malware
    • Viruses
  • Security
  • Security News
  • Vulnerabilities

Search

  • Sitemap
  • Privacy Policy and Terms of Service
  • About Us

Social Profiles

Security Zap Copyright © 2019.
Cyber Security Done Right!