DDoS Attacks evolve into sophistication
According to global DDoS attack report by Akamai’s Prolexic in 2014 the popularity of reflection and amplification attacks was on the rise. Report estimates that number of DDoS at…
According to global DDoS attack report by Akamai’s Prolexic in 2014 the popularity of reflection and amplification attacks was on the rise. Report estimates that number of DDoS at…
Experts at Sentinel Labs security firm have discovered Gyges malware in the wild in March 2014, the malicious code appears very sophisticated to the researches which attributed it…
Apple has worked hard to make iOS devices reasonably secure but hidden services could be exploited to steal every user’s data in a stealthy way.
According to advisories published by both Siemens and the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), the security holes affect APE versions prior to 2.0.…
An Apache HTTP server buffer overflow vulnerability could allow attackers to execute code remotely, according to an advisory by the Zero Day Initiative.