For sale only $10. The name of the airport is not known for security reasons, but it is an important international hub. Involved also other governmental realities and the health world.
Discovered by Cisco researchers, the malware is highly sophisticated and can allow attackers to render the device unusable and to perform other criminal actions.
The miner was not hidden and asked for permission from the user, in exchange for premium features. But two bugs caused unexpected operation and forced the developer to retrace his steps.
A new vulnerability in Flash allows you to install remote administration tools that allow you to take control of the target system. Adobe will run for cover, but the advice is to stop using Flash Player.
It compromises the Claymore Mining software and changes the address of the target wallet with one controlled by the attacker. The diffusion is not clear, but it could be the beginning of a new fashion in the world of cyber threats.
The extensions identified are part of a campaign that directs the browser in secret on sites full of advertisements, but in expert hands, they could also be used as spy tools.
SplashData has compiled as every year the list of the worst passwords used by users. In first place the numerical sequence " 1234562 followed by the word " password ", here is the ranking.
A search by Kaspersky Lab reveals how many of the most popular dating apps in the world do not correctly follow good security practices, exposing their users to data theft and conversations.