According to the information published by experts IBM Security X-Force, in sf yesterday;the end of July 2015 it was discovered a version of the trojan Tinba v3 specifically configured to target a number of 12 banking and financial institutions of the Rom yesterday;nia. Tinba is not a cyber threat ne ... Read more ->
Mobile devices running a version of the operating system Android, from îbetween version 2.2 and version 5.1.1_r4, contain multiple vulnerabilities of the engine of the multimedia playback Stagefright. Exploitation of these vulnerabilities may allow an attacker to access your multimed ... Read more ->
Introduction BIND is the software open-source DNS (en. Domain Name System) most used in the Internet. „Berkeley Internet Name Domain” was developed at the University of California, Berkeley, at îthe beginning of the 1980s. În present, the application of large volume, which im ... Read more ->
UPDATE 15.07.2015 Adobe has published updates that addresses the problems arising within the last period as well : - Vulnerabilities in Adobe Flash use-after-free and corruption of memory (CVE-2015-5119, CVE-2015-5122, CVE-2015-5123) determined by the grades ActionScript 3 ... Read more ->
Ransomware is malicious software that prevents access to files, or even entire infected system, to pay a "bounty". This type of malware is nothing new, but to make it harder to recover files, ransomware sites block access to current files (documents, photos, music, video, etc.) through their asymme ... Read more ->