Network Security

Google Chrome to start marking HTTP connections as insecure

13/09/2016 15:17:57

To push more websites to implement encryption and to better protect users, Google will start flagging plain HTTP connections as insecure in its popular Chrome browser....

Best Practices to Protect yourself against Ransomware

07/09/2016 11:56:04

Ransomware is a malicious software that cyber-criminals use to hold your files (or computer) for ransom and requiring you to pay a certain amount of money to get them back by encrypting your files. How to protect yourself against it ?...

Zabbix SQL Injection Vulnerability

25/08/2016 12:30:59

On Aug 12th, 2016, 1n3 exposed by email that SQL injection vulnerability exists when jsrpc.php file of Zabbix processes profileIdx2 parameter, which is similar to a previous SQL injection with INSERT statement when latest.php file processes toggle_ids parameter. The only difference between the two is the attacking point. ...


24/08/2016 12:00:06

Researchers claim to have found the largest ransomware-as-a-service (RaaS) ring to date. The operation generates an estimated $2.5 million annually and targets computer users with a new variant of the notorious Cerber ransomware....

Beware! Advertisers Are Tracking You via Phone's Battery Status

15/08/2016 11:55:36

Forget about supercookies, apps, and malware; your smartphone battery status is enough to monitor your online activity, according to a new report....

Four Flaws hit HTTP/2 Protocol that could allow Hackers to Disrupt Servers

06/08/2016 11:40:19

If you think that the HTTP/2 protocol is more secure than the standard HTTP (Hypertext Transfer Protocol), then you might be wrong, as it took researchers just four months to discover four flaws in the HTTP/2 protocol....

QRLJacking - Hacking Technique to Hijack QR Code Based Quick Login System

29/07/2016 17:15:44

Do you know that you can access your WeChat, Line and WhatsApp chats on your desktop as well using an entirely different, but fastest authentication system?...

Struts2 devMode Remote Code Execution Vulnerability

18/07/2016 17:25:31

In recent months, Struts2 exposed several critical vulnerabilities. This vulnerability appears when devMode is enabled, and allows attackers to execute code remotely. Even arbitrary instructions can be executed remotely if WebService startup privilege is the highest, such as commands for shutdown, creating new user accounts, deleting all the files on the server, and so on. ...

The hacker behind the Twitter account 0x2Taylor is claiming to have breached one of the Amazon servers containing 80,000 login credentials of Kindle users.

13/07/2016 17:10:26

The hacker 0x2Taylor is claiming to have breached an Amazon server containing login credentials of Kindle users. As a proof the hack, the hacker leaked online more than 80,000 credentials belonging to Amazon users, he also explained that the company ignored his warnings about the existence of vulnerabilities in its servers....

New Android malware has already infected 10 million devices worldwide

07/07/2016 17:00:58

Another day, another report of Android malware wreaking havoc across the world. Earlier this month, security researchers from Check Point published a report on a newly discovered piece of malware called HummingBad that has reportedly infected as many as 10 million devices worldwide....

Our Social Networks

Global Service Center: