Security News



If you saw the film Wall Street, you undoubtedly recall the iconic character Gordon Gekko famously stating, “what’s worth doing is worth doing for money.” This perspective is increasingly making...

Drive-by exploits install ransomware on outdated Android devices using a stolen Hacking Team exploit and the first weaponized Towelroot attack.

Now in its tenth year, the Top 10 List of Web Hacking Techniques takes a step back from the implications of an attack to understand how they happen. The list is chosen by the security research...


Here’s an overview of some of last week’s most interesting news and articles: Hacking Team hacker explains how he did it In a Pastebin post, he shared that he exploited a zero-day vulnerability in...

The hacker who hacked Hacking Team posted a lengthy description of how he broke into the company and stole everything. Two articles. ETA: This post originally had a pastebin.com link to the...

With the advent of the Internet of Things, we’re lucky to have researchers looking into these devices and pointing out the need for securing them better. One of these researchers is Kaspersky...
