Update 5 (Monday 16.05.2017 BDT): Now you can add Bangladesh officially to the list of affected countries suffering from this ransomware. Number of affected workstation or laptops varies from 30-50. If you still haven’t install patches that has been released to solve this issue. Please do it now. And refrain yourself from clicking any link coming through mail unless you are absolutely sure of its authenticity…
A security analyst has unveiled security flaws in the third-party API used by Symantec certificate partners. This Symantec API flaw can allow the attackers to retrieve SSL certificates including private keys. The Symantec API flaw was first found by Chris Byrne, a data security specialist and instructor for Cloud Harmonics. He discussed the details in his Facebook post. Symantec API flaw exposes SSL certificates…
As you can see in the above image, Application Processor (AP) is at core of the system of any modern mobile platform. As it is getting most of the attention from security researchers, attackers has been gradually shifting their attention to other less-attended parts such as sensors, camera or Wi-Fi & BT System on a Chip (SoC). Today we going to focus on Wi-Fi System…
Previously, there were report about infecting android devices with malware through the Apps downloaded from Android Stores. It is only getting worse with time. Recently android devices of various vendors were found with pre-installed malware. They were discovered to be loaded with malwares pre-installed somewhere along the supply chain. Check Point Software Technologies said that it found that 38 Android handsets were infected with adware, information-stealing malware…
What is a Trojan Horse Attack? A Trojan horse, often shortened to Trojan, is a type of malware designed to provide unauthorized, remote access to a user’s computer. Suppose you are working in a Bank and you have a communication system like Viber or Whats app to communicate with other colleagues. One day a new message with Hyper Text Link came to your inbox from…