Tor Network in Trouble: Threat Actors Using DDoS Booters to Slow It Down

Posted on August 19, 2019 at 1:01 PM Tor browser’s anonymity network is endangered yet again, as researchers uncover that nation-states and threat actors can significantly impact its performance rather cheaply. A new report...

5 Common Phishing Attacks and How to Avoid Them?Security Affairs

Phishing is one of the oldest methods of cyberattacks. It uses deceptive and manipulated emails as a tool for gathering personal and...

Microsoft Patch Tuesday – August 2019

This month Microsoft has patched 93 vulnerabilities, 27 of which are rated Critical. Cumulative Security Update for Microsoft Browsers Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1131) MS Rating: Critical A remote code execution...

3 Reasons why SAAS Business need to Concentrate on website Security

Businesses that are growing are always trying to expand in all departments and to do that they need a website that portrays their business, customers, the value they generate and...

Are you being tracked through a Bluetooth security vulnerability?

Research published this month by a team from Boston University has revealed a number of flaws in the way that Bluetooth Low Energy functionality is implemented on a wide range...

Introducing Asset Inventory: stay on top of your web asset security

Good security starts with knowing your web assets. To enable transparency over your tech stack, we have released Asset Inventory, a new view that helps you prioritize security issues and...

Huawei’s Alternate To Google Maps

Huawei to launch an alternate to Google Maps for Android OS for its phones called MapKit. It is expected to launch by...

Lessons from Password Checkup in action

Today, we are sharing our most recent lessons from the launch and announcing an updated set of features for the Password Checkup extension. Our full research study, available here, will...

85 Photography and Gaming Adware Apps Installed Over 8 Million Times

Researchers discovered nearly 85 malicious adware apps in Google play store that intended to upload for delivering adware and monetize from affected Android devices. These Fraudulent adware apps were installed over...

APLICATIONS

HOT NEWS