Search
Monday 23 October 2017
  • :
  • :

The secret spy agency is releasing a malware-fighting tool for free

Canada’s electronic spy agency says it is taking the “unprecedented step” of releasing one of its own cyber defence...

A New IoT Botnet Storm is Coming

A massive Botnet is forming to create a cyber-storm that could take down the internet. An estimated million organizations have already been...

Cybersecurity Is Changing The Way Leaders Behave

Cybersecurity threatens leaders everwhere The biggest threat that leaders — and specifically, CEOs — face isn’t brand positioning,...

The next big thing in cybercrime? Here are the FBI’s ones to watch…

If you’re a Federal Agent who happens to fight cybercrime, what sort of stuff lands on your desk? The latest Internet Crime Report paints...

Google launched Google Play Security Reward bug bounty program to protect apps in Play Store

Google has launched Google Play Security Reward, the bug bounty program that will pay $1,000 rewards for flaws in popular apps. Google has...

Anonymous Greece – Ministry of Finance #TangoDown

The economy in the air. Υπουργείο Οικονομικών Service Temporarily Unavailable. #AnonymousWorldwide #HelpGreece...

Sockbot Malware: Εντοπίστηκε σε Android apps στο Google Play

Sockbot: Πολλές είναι οι εφαρμογές στο Google Play που έχουν μολυνθεί κατά καιρούς...

ECSC 2017: Όσα συνέβησαν στην χτεσινή εκδήλωση γνωριμίας

European Cyber Security Challenge 2017 Εκδήλωση γνωριμίας Χτες το απόγευμα πραγματοποιήθηκε...

Hack the BTRSys: v2.1 VM (Boot2Root Challenge)

BTRSys is boot2root challenge developed by ‘ismailonderkaya’ in the series of BRTSys. This is an amazing lab for practice which has...

Cybersecurity is Top Concern in Corporate IoT Deployments

BlackBerry-commissioned whitepaper from 451 Research looks at security in the Enterprise of Things WATERLOO, ONTARIO–(Marketwired...

Local government faces security risks from ransomware, phishing and malicious threats

Local government agencies are firmly in cybercriminals’ sights. Between June 2016 and June 2017, almost nine out of ten (87 per cent)...

Predictive Analytics: Fad or the Future of Cyber Security?

They’re called superforecaster. A subset of human study volunteers who have an uncanny ability to predict the future better than the...

October 2017 Oracle Critical Patch Update addresses 252 Vulnerabilities

Oracle released the October 2017 Critical Patch Update (CPU) that addresses a total of 252 security vulnerabilities that affect multiple...

Google introduces new Advanced Protection feature to protect its users

Google continues working to improve the security of its users, the last measure introduced by the company it the ‘Advanced...

Marianas web το Deep Web και ιστορίες για αγρίους

Marianas web: Την πρώτη φορά που ακούσατε για το Deep Web μάλλον αισθανθήκατε...

Google: νέες λειτουργίες προστασίας στο διαδίκτυο

Ο Οκτώβριος είναι Μήνας Ενημέρωσης για την Κυβερνοασφάλεια και η Google το...

Fosscomm 2017: 4-5 Νοεμβρίου στο Χαροκόπειο Πανεπιστήμιο

Στις 4-5 Νοεμβρίου 2017 στο Χαροκόπειο Πανεπιστήμιο (Ελευθερίου Βενιζέλου 70...

PortEx: Java library for static malware analysis of portable executable files

PortEx is a Java library for static malware analysis of portable executable files. Its focus is on PE malformation robustness and anomaly...

Hack the Bulldog VM (Boot2Root Challenge)

Hello friends! Today we are going to take another CTF challenge known as Bulldog. The credit for making this vm machine goes to “Nick...

EllaScanner – Passive Web Scanner

Passive web scanner. EllaScanner is a simple passive web scanner. Using this tool you can simply check your site’s security state. Usage:...

DorkNet – Selenium Powered Python Script To Automate Searching For Vulnerable Web Apps

Selenium powered Python script to automate searching the web for vulnerable applications. DorkNet can take a single dork or a list of dorks...

Κενό ασφαλείας στο Adobe Flash μπορεί να επιτρέψει την εγκατάσταση malware

                  Για ένα σημαντικό κενό ασφαλείας στο Flash...

Θωρακισμένα τα Windows απέναντι στην ευπάθεια KRACK των δικτύων WiFi

                  Ομάδα ερευνητών από το Βέλγιο...

Εξιχνιάστηκε υπόθεση ηλεκτρονικής απάτης με μηνύματα σε smartphones

Από τη Διεύθυνση Δίωξης Ηλεκτρονικού Εγκλήματος εξιχνιάστηκε υπόθεση...

Krack: Πρέπει να ανησυχώ; Όλα όσα πρέπει να ξέρετε

Krack Attacks: Πριν από μέρες ανέφερα μέσω του SecNews.gr για ένα ελάττωμα στο πρότυπο...

pcc: PHP Secure Configuration Checker

PHP Secure Configuration Checker Check current PHP configuration for potential security flaws. Simply access this file from your web server...

ROCA: Infineon RSA vulnerability

ROCA detection tool This tool is related to ACM CCS 2017 conference paper #124 Return of the Coppersmith’s Attack: Practical...

MHA: Mail Header Analyzer

Mail Header Analyzer (MHA) What is MHA: Mail header analyzer is a tool written in [flask] (http://flask.pocoo.org/) for parsing email...

Hack the Lazysysadmin VM (CTF Challenge)

Hello friends! Today we are going to take another CTF challenge known as Lazysysadmin. The credit for making this vm machine goes to...

4 Ways to Capture NTLM Hashes in Network

Hello friends! Today we are describing how to capture NTLM Hash in a local network. In this article we had captured NTLM hash 4 times...