Security Breach Attacks On Industrial Computers

All too often, network or security administrators only often focus on the security of regular computers, servers, and networks because these often contain sensitive information. By contrast, industrial computers tend to be overlooked when it comes to security. They are

CoinVault another ransomware variant

Ransomware a malicious program which infects your equipment and provides cybercriminals the ability to remotely lock your PC and encrypt your files, control all information stored on users machine. it will also display a pop-up window to instruct how to pay

“Want To Know Who’s Watching You?” is a Facebook scam

Malwarebytes alerting Facebook users about a new website that claim to provide the list of users who watched your profile. this is a scam similar to the Facebook Profile Viewer scam that hijack users profile. The url is pointing to

Parrot Security OS- Cloud friendly Security Testing Operating System

Today we have many distributions that can be used for pentest including kali, backbox and Parrot. Parrot Security OS is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on

Password protected document spreads banking malware

New malware have been uncovered by TrendMicro that is targeting users to grab bank credentials. Today most people use the online banking services to pay for any product and this makes such malware very dangerous and will allow cybercrminals to

nogotofail- Blackbox network traffic security testing tool

nogotofail

Nogotofail is an automated tool that you can use for testing network security on any device. this to allow finding security vulnerabilities , to verify fixes and monitor regression and understand the application traffic generated by the network device. The

Pam_steal Plugin – Pam password logger

Password

PAM (Pluggable Authentication Modules) is a set of shared libraries that enable the integration of a variety of low-level authentication methods in a single high-level API. This allows you to provide a uniform mechanism for managing, integrating applications in the