Charging your smartphone’s battery over USB can be dangerous

27/05/2016 16:50:35

Chances are that each of us has found ourselves in a situation where our phone is dying and we have no charger on hand, but at the same time we desperately need to stay connected — to answer an important call, receive a text message or email, whatever....

Bank Hack – How to steal $25 Billion with a few lines of code

19/05/2016 16:55:10

The security researcher Sathya Prakash discovered that the critical vulnerabilities reside in the mobile banking application used by the bank customers....

Vulnerability Alert: ImageMagick Remote Code Execution Vulnerability (CVE-2016-3714)

06/05/2016 16:50:19

On Tuesday, May 3 2016, ImageMagick announced a zero-day vulnerability (CVE-2016-3714) in the ImageMagick software. The attacker can exploit the vulnerability to execute arbitrary code remotely, intercept important information and take over the servers eventually....

Struts2 was exposed high-risk vulnerability, NGAF will protect you !

27/04/2016 10:25:03

Struts2 was exposed high risk vulnerability s2-032, CVE-2016-3081, attackers could execute arbitrary remote commands through this vulnerability.The financial industry has become the hardest hit by this vulnerability for the moment,other web site which uses Struts2 open source framework should do the security work in time....

Locky Ransomware Virus

30/03/2016 10:30:03

Locky ransomware virus often spreads via emails and malicious links to Trojans. Once the file infected with the Locky virus is downloaded, it runs automatically and deletes the ransomware sample to evade anti-virus detection. Then, the Locky virus leverages Internet access permission to connect to the C&C server controlled by a hacker in order to upload information from infected endpoint devices and download a private key from the C&C server, which will be written into the registry. Therefore, files in all local disk drives will be traversed and encrypted, and texts will be presented in desktop to tell victims to pay the ransom (using BitCoins in most cases)....

Safeguard your employees against Ransomware !

22/03/2016 16:12:27

Getting infected with Ransomware always end up costing the victims thousands of dollars. The cyber-thieves’ malware works by either holding your entire computer hostage or by blocking access to all of your files by encrypting them. The Ransomware victim is typically ordered to finish the required payment in order to get the key to unlock their encrypted data....

Security Expertise as a Service - Vision to Renovate Commercial Security Solution

17/03/2016 14:58:52

To have competent technical staff dealing with skillful hackers & cyber threat risks is not realistic for most of organizations. Even when there are staff with high expertise, effective threat visibility tools are essential to assist on the risk mitigation operation. ...

WebSVN 2.3.3 Cross Site Scripting Vulnerability

12/03/2016 10:30:48

WebSVN offers a view onto your subversion repositories that's been designed to reflect the Subversion methodology. You can view the log of any file or directory and see a list of all the files changed, added or deleted in any given revision. You can also view the differences between two versions of a file so as to see exactly what was changed in a particular revision....

Popular WordPress Plugin Comes with a Backdoor, Steals Site Admin Credentials

11/03/2016 15:05:01

Security researchers have unmasked the wicked actions of a WordPress plugin that was installing a backdoor through which it was altering core WordPress files so it could log and steal user credentials from infected sites....

DROWN Attack - More than 11 Million OpenSSL HTTPS Websites at Risk

02/03/2016 11:00:02

A new deadly security vulnerability has been discovered in OpenSSL that affects more than 11 Million modern websites and e-mail services protected by an ancient, long deprecated transport layer security protocol, Secure Sockets Layer (SSLv2). ...

Our Social Networks

Global Service Center:

COPYRIGHT © 2000-2017 SANGFOR TECHNOLOGIES INC. ALL RIGHTS RESERVED.