Search Results

The Botnet infected Linux-servers which used a vulnerable version of Apache Tomcat, Apache Struts and Elasticsearch. Experts of Akamai-Prolexic discovered a botnet known as IptabLes and IptabLex. It was used to carry out DDoS-attacks on the DNS-servers and other objects of the network infrastructure. Victims of botnet became misconfigured Linux-servers. According to experts, in the […]

For every bad hacker there’s a good one. Here we look at six white hat hackers who have contributed to security advances. Despite gaining a less than desirable reputation, hacking has not always been the tool of evil. White hat hackers – those technological boffins who use their skills to help others to improve their […]

Malware, viruses, bot injection, DDoS attacks ad infinitum. For years now they have been the bane of webmasters, company executives and owners around the world. With the annual damage from malware alone exceeding $13 billion, to date there has been no solution to predict if an attack is coming your way or if your website […]

The Internet is filled with malicious software. You may think that it’s confined only to low quality websites or places where the webmasters aren’t so keen about checking user-submitted content, but it’s actually possible for malware to be hosted on any website. That gives hackers 700 million different websites through which they could deliver malware […]

Do you want to spend the rest of your life in a boring office doing typical corporate nonsense, or do you want to get paid for hacking? For many teens and young adults, this is a dream come true. Spending your days destroying viruses, outsmarting other hackers and being the hero that thwarts a cyber […]

If you can do a number of things, the need for a huge number of IT professionals is not required to prevent hackers from taking over your online banking system. Essentially, small businesses find online banking very convenient and easy while at the same time very vulnerable to cyber criminal targets. Lots of small businesses […]

All online users are vulnerable to hackers especially those who are using a webcam. A webcam is a digital camera that is installed in a computer and is connected to the internet where you can view another online user from a different location. They are usually installed on desktop computers and laptops while others are […]

Anti-virus company revealed the new technology of cloud cyber attacks. Experts in the field of computer security have identified a new way of carrying out cyber attacks based on the placement of the virus code in the cloud storage. According to experts of G Data, the virus placed in the “cloud ” can be used […]

Symantec reported the detection of an attack on a popular hosting “Freedom Hosting”, which provides anonymous hosting service through a network of Tor. On the page of the service have been detected malicious scripts that allow attackers to intercept user data network Tor. As a result, questioned the anonymity of the hosting center – in […]

Cyber ​​criminals are increasingly turning to the services of the Panamanian service Perfect Money. Three months later, after a group of international human rights organizations raided the office of the electronic payment system Liberty Reserve (after the company closed down), cybercriminals, most experts say, are increasingly turning to the services of the service Perfect Money. […]