News

Latest News

vBulletin CVE

VBulletin fixed a dangerous vulnerability

VBulletin developers encouraged everyone to update their installations as quickly as possible. The fact is that a critical vulnerability has been fixed in the forum engine. Let me remind you that vBulletin...
P2P Torrents

How to use torrents safely and legally

Torrents work on P2P technology, when there is no central server or repository, all network participants have the same rights and can download files from dozens (or hundreds) of other computers.
Mobile device security

15 tips to protect against spying on your smartphone

Mobile phones have long become an integral part of our personal space. However, with the growing number of cyber crimes and the popularity of third-party applications, the confidentiality of data stored on...
IBM information disclosure

Details disclosed for four 0-day vulnerabilities in IBM Data Risk Manager

Agile Information Security's lead researcher and a well-known bug hunter regularly involved in hacking events such as Pwn2Own, Pedro Ribeiro has posted on GitHub the details of four zero-day vulnerabilities for the...
email-phishing-attacks

Weapons of mass delusion: 10 simple recipes for successful social engineering

What is social engineering? Social engineering, in the context of information security, is the psychological manipulation of people into performing actions or divulging confidential information. This differs from social...
GDPR Penetration Testing

Penetration Testing for GDPR

What is GDPR? The General Data Protection Regulation (GDPR) is focused on the personal data of citizens within the European Union. GDPR is often viewed as having two...
tpm-fail-vulnerability

TPM-FAIL Vulnerabilities Threaten PCs, Laptops, Servers, and Other Devices

A joint group of researchers from the Worcester Polytechnic Institute (USA), the University of Lubeck (Germany) and the University of California at San Diego (USA) revealed details of two problems, collectively called...
upwork-scam

Someone asked to share UpWork account

Over the past couple of years, there have been more frequent cases with requests to provide access to the account on UpWork for money. Usually people ask to provide such access as...
osint-recon

Useful tools for OSINT

What is OSINT? Open Source Intelligence, or "OSINT," was defined by the Department of Defense (DoD) as “produced from publicly available information that is collected, exploited, and disseminated...
iot-security

2019’s Most Common IoT Security Threats to Consider

Being used in hitherto unheard of sectors, IoT is gaining momentum day in day out! Due to which more and more companies are jumping on the IoT bandwagon with various point solutions and capabilities.

Bug Bounty