Firefox 67.0.4 Released — Mozilla Patches Second 0-Day Flaw This Week

Okay, folks, it's time to update your Firefox web browser once again—yes, for the second time this week.After patching a critical actively-exploited vulnerability in Firefox 67.0.3 earlier...

5 SIMPLE WAYS TO PROTECT AGAINST CYBER-ATTACKS

The incidences of cyber-attacks are on the rise as attackers seek to exploit and benefit from vulnerable networks for, but not limited to, financial gains. Cyber crime has the potential...

BACKDOOR ATTACKS AND THREATS

OPERATION SHADOWHAMMER A latest backdoor threat to computer systems dropped and propagated via software updates is making rounds these days. Essentially a supply-chain attack, Operation...

PRROFESSIONAL WEB SECURITY TECHNIQUES

Malware infected damages and attacks continue to propagate through global networks, which has become the attackers’ most preferred and effective methodology for launching and propagating malicious applications for nefarious needs....

XKEYSCORE DATA COLLECTION AND SORTING MECHANISMS

The XKeyscore system depends on an immense data mining and storage program for its success. In this context, it is desirable to have an efficient system that can process,...

XKEYSCORE FOR HACKING AND COUNTER-INTELLIGENCE

INTRODUCTION NSA’s prized data sniffing and storing database plays a pivotal role in how the US government and its allies hack computer networks globally. As per...

XKEYSCORE – AN INDEPTH ANALYSIS PART – II

XKEYSCORE OPERATIONS – LIFTING THE HOOD The XKeyscore’s reach across the global web traffic is so intense and well entrenched that there is a fair chance...

XKEYSCORE – AN INDEPTH ANALYSIS PART – I

INTRODUCTION AND SCOPE The XKeyscore has taken mass surveillance to newer levels of sophistication. In NSA’s words, it is the agency’s ‘widest reaching’ spying system. Experts have...

VULNERABLITIES OF THE XKEYSOCRE SYSTEM

The XKeyscore is a highly sophisticated and efficient data collection and storage surveillance program. It is, therefore, natural to assume that the architecture of such a critical system that is...

COUNTERING THE VPNFilter THREAT

The VPNFilter targets IoT devices that include a large number of users who aren’t tech savvy to defend against such lethal threats by following even the minimum guidelines for countering...
- Advertisement -

Latest article

Hackers Compromise Microsoft Support Agent to Access Outlook Email Accounts

If you have an account with Microsoft Outlook email service, there is a possibility that your account information has been compromised by...

Binance Hacked — Hackers Stole Over $40 Million Worth Of Bitcoin

Binance, one of the largest cryptocurrency exchanges in the world, confirmed today that the company lost nearly $41 million in Bitcoin in...

Exclusive: German Police Raid OmniRAT Developer and Seize Digital Assets

The German police yesterday raided the house of the developer of OmniRAT and seized his laptop, computer and mobile phones probably as...