Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the crayon-syntax-highlighter domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/ktech37/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the otw_dcsw domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/ktech37/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/ktech37/public_html/wp-includes/functions.php on line 6114
Cyber Security Archives » Page 6 of 11 » KryptosTechnology

Cyber Security

DoubleAgent: Zero-Day Code Injection and Persistence Technique

Cybellum security researchers have uncovered a new attack mechanism that can be used to take control of your antivirus and turn it into a malware. Called DoubleAgent, this attack exploits an old and undocumented vulnerability in Windows operating system. This Zero Day code injection technique affects all major antivirus vendors and has the power to […]

DoubleAgent: Zero-Day Code Injection and Persistence Technique Read More »

ISPs Can Now Sell Your Web Browsing History Without Your Permission

The US Senate has voted to discard the broadband privacy rules that would have forced the ISPs to seek consumers’ permission before selling their personal and web browsing data. The Senate, with Republican Majority, voted 50-48 and made sure that FCC will be prevented from issuing similar rulings in future. he House, also with the

ISPs Can Now Sell Your Web Browsing History Without Your Permission Read More »

hacking-competition-witness-ubuntu-linux-edge-safari-adobe-reader-exploits

Hacking Competition Witness Ubuntu Linux , Edge, Safari and Adobe Reader Exploits

The Pwn2Own 2017 event marked the 10th year of the annual hacking competition that began on March 15. Adobe Reader, Edge, Safari, and Ubuntu fall during first day at Pwn2Own he Pwn2Own contest runs every year during the CanSecWest security conference in Vancouver, Canada. It’s organized and sponsored by Micro’s Zero Day Initiative (ZDI). This

Hacking Competition Witness Ubuntu Linux , Edge, Safari and Adobe Reader Exploits Read More »

36 High-End SmartPhone has Pre-Installed Android Malware

These malware infected devices were identified after a Check Point malware scan was performed on Android devices. Two malware families were detected on the infected devices: Loki and SLocker. t least 36 high-end smartphone models belonging to popular manufacturing companies such as Samsung, LG, Xiaomi, Asus, Nexus, Oppo, and Lenovo, which are being distributed by

36 High-End SmartPhone has Pre-Installed Android Malware Read More »

CIA Malware Targets IPhone, Android, Smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

CIA Malware Targets IPhone, Android, Smart TVs Read More »

WikiLeaks Publishes “CIA’s Entire Collection Of Hacking Tools”

WikiLeaks has leaked CIA’s complete collection of hacking tools and malware. These tools have been devised to target Windows, Linux, and macOS computer, iOS and Android smartphones, and many other electronic devices. This dump is available for download via a torrent file. ikiLeaks has published a collection of United States Central Intelligence Agency’s (CIA) collection

WikiLeaks Publishes “CIA’s Entire Collection Of Hacking Tools” Read More »