The U.S. is vulnerable to weaponized cyberattacks

Americans should get more serious about cybersecurity. The United States is extraordinarily vulnerable to cyber attacks from others enemy nations and even individual hackers. Representatives from the federal government, cybersecurity firms, and private investors say that nowadays specific software has made it easy for even the smallest countries or even[…]

Read more

Hard-Coded password in Cisco Software is used by Hackers to take over Linux Servers

A critical cybersecurity vulnerability has been discovered in Cisco Prime Collaboration Provisioning software. This cybersecurity vulnerability can be used by a local hacker to elevate privileges to root and take full control of a system. Cisco Prime Collaboration Provisioning (PCP) application allows administrators to remotely control the installation and management[…]

Read more

Mobile Ad Trojans Evolve to Maximize Profits

Mobile advertising Trojans are using new monetization schemes that involve paid SMS and WAP-billing services to preserve and increase profits. These Trojans represent a new cybersecurity problem; if they obtain root privileges, they can secretly install various applications or bombard an infected device with ads to make use of the[…]

Read more