-
Archives
- May 2018
- April 2018
- March 2018
- February 2018
- December 2017
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
-
Meta
Monthly Archives: February 2018
HACKERS SPREAD ANDROID SPYWARE THROUGH FACEBOOK USING FAKE PROFILES
The Android spyware was used to steal personal data of victims – The campaign also shows why users should never use their real photos on Facebook. There are almost 2 billion monthly active users on the social media giant Facebook and that … Continue reading
Posted in Uncategorized
Leave a comment
CROWBAR: A TOOL TO PERFORM BRUTE FORCE ATTACKS ON DIFFERENT SERVICES
Crowbar is a tool that is specifically developed to perform brute force attacks during pentesting tests. This tool applies brute force attacks differently than other tools that already exist. Today there is a large number of tools to attack the … Continue reading
Posted in Uncategorized
Leave a comment
HOW TO HACK USING PARAT- REMOTE ACCESS TROJAN (RAT)?
According to cyber security specialist; a Remote Access Trojan (RAT) is a type of malware that controls a system via a remote network connection as if by physical access. While desktop sharing and remote administration have many legal uses, RAT is usually … Continue reading
Posted in Uncategorized
Leave a comment
PYMES EUROPEAS PAGARON CASI $100 MILLONES POR RANSOMWARE EN 2017
Las PYMES europeas se vieron obligadas a pagar casi $100 millones para recuperar el acceso a computadoras bloqueadas, ya que un ransomware continuó atacando en la región el año pasado, según un informe de una empresa de seguridad informática. Una … Continue reading
Posted in Uncategorized
Leave a comment
A SECURITY BREACH AFFECTS MORE THAN 300.000 MICROS POS ORACLE SYSTEMS
Cybercriminals have found a new security flaw that they can exploit to install POS malware in Oracle Micros’ point-of-sale systems. Oracle has already issued updates for this problem. However, this will take months until the patch reaches the affected POS … Continue reading
Posted in Uncategorized
Leave a comment