back to top
Advertisement
Home 2015

Yearly Archives: 2015

Remove TeslaCrypt ransomware and recover encrypted .vvv/.ccc files

0
Neither TeslaCrypt nor its copycat AlphaCrypt ransomware is new on the cybercrime arena. In fact, this infection first surfaced in early spring 2015, and...

Reason Core Security review

1
For a security solution to be efficient, it does not necessarily have to be heavyweight and feature-abundant. While some might disagree, the Reason Software...

Remote Exploitation of an Unaltered Passenger Vehicle

0
Twitter’s Charlie Miller and IOActive’s Chris Valasek present their research on the buzz topic of remotely hacking into the controls of the modern vehicles. ...

Remove Ads by DNS Unlocker adware

0
The controversial story of DNS Unlocker software got a kick-off into the public realm with a thread created on VIDCreek.tv online sharing community. In...

Chris Rock – I will kill you

1
In the course of his DefCon 23 presentation, Australian security expert Chris Rock demonstrates how fake death or birth records can be created these...

No Budget Threat Intelligence – Tracking Malware Campaigns on the Cheap

0
Andrew Morris, formerly an Intrepidus Group employee and currently researcher at Endgame, proves at ShmooCon that threat intel doesn’t have to be expensive. Andrew Morris:...

Securing our future – Mikko Hyppönen

0
Mikko Hyppönen, F-Secure’s CRO and security celebrity who needs no introduction, highlights current and emerging concerns caused by ubiquity of the Internet. I am...

Remove CryptoWall 3.0 ransomware and mitigate the file damage

2
While the individuals behind CryptoWall 3.0 virus remain pinned to the “most wanted” cybercriminals list, their infamous product has been up and running for...

How not to suck at pen testing – John Strand

0
John Strand, the owner of Black Hills Information Security, shares his perspective upon what the present-day penetration testing should be like. The name of this...

Adaptive Penetration Testing by Kevin Mitnick & Dave Kennedy

0
Computer security gurus Kevin Mitnick and Dave Kennedy taking the floor at DerbyCon to explain the concept of adaptive pentesting and cover its advantages. Dave...

STAY CONECTED

934FansLike
549FollowersFollow

LATEST NEWS