Hacker

Tech Patrol

Fastest Spread Ransomware Attack In China’s History

A new interesting technique of ransom attached to a rapidly spreading ransomware attack in China is getting the world’s tech leaders attention as the infection has spread to more than 100,000 computers in the last four days as a result of a supply-chain attack. An impactful point is that the number of infected users is continuously growing …

Fastest Spread Ransomware Attack In China’s History Read More »

Tech Patrol

Australia’s Think Tank Has Been Hit By a Chinese Cyber Attack

The Lowy Institute, known as Australia’s biggest, independent, foreign affairs think tank. Providing high-quality research and distinctive perspectives on the international trends shaping Australia and the world. The organisation has now been hit by cyber-attacks that have reportedly come from China and throughout this article, we will break down how this has happened and if it …

Australia’s Think Tank Has Been Hit By a Chinese Cyber Attack Read More »

Tech Patrol

Dell.com Resets All Passwords After Cyber Attack

Dell, one of the biggest technology companies in the world has stopped an attack on its Dell.com electronics store after an unknown group of hackers attempted to steal all customer data including their names, home addresses, email addresses and hashed passwords, through their internal network. On November 9th, Dell detected an disrupted unauthorised activity on …

Dell.com Resets All Passwords After Cyber Attack Read More »

Zeroday initiative - Tech Patrol

Dangerous Zero-Day Found In iPhone X,m Samsung Galazy S9 Phones

White Hat hackers at Pwn20wn 2018, a mobile hacking competition held in Tokyo last week, demonstrated that even the fully patched smartphones running the latest version of software from popular smartphone manufacturers can be hacked. This article will detail the event and what you can do to protect yourself. Three major vendors – Apple, Samsung …

Dangerous Zero-Day Found In iPhone X,m Samsung Galazy S9 Phones Read More »

Tech Patrol

Email Security In An Age Of Ransomware and Phishing Attacks

There has been a rapid growth on the attention regarding Email security as the landscape around phishing campaigns that deliver ransomware continues to grow within’ organisational concerns. Recently, there has been no shortage of notable cyber attacks. The ‘I’m A Programmer Who Cracked Your Email’ Scam, is just one of the most recent email scams that not …

Email Security In An Age Of Ransomware and Phishing Attacks Read More »

Intel logo-Tech Patrol

New Intel CPU Flaw Leaves Millions Vulnerable

Security researches have found a new Intel CPU flaw that exploits Hyper-Threading to steal encrypted data which can allow hackers access to sensitive protected data, like cryptographic keys, passwords, from all other processes running in the same CPU core with simultaneous multi-threading feature enabled. Throughout this article, we will release the details of the flaw and show …

New Intel CPU Flaw Leaves Millions Vulnerable Read More »

BleedingBits Bluetooth Flaw - Vulnerability - Tech-Patrol

Critical Bluetooth Vulnerability Exposes Millions Of Devices

Security researchers from Israeli security firm Armis, have unveiled details of two critical vulnerabilities in Bluetooth’s Low Energy Chips (BLE) that are embedded in millions of access points and networking devices used by enterprises around the world. Throughout this article, we will look to bring light into the situation to make sure that you’re better …

Critical Bluetooth Vulnerability Exposes Millions Of Devices Read More »

TRend-Micro-Emil-Tech-Patrol

Trend Micro Cloud Email Gateway (key features)

Email is mission-critical when it comes to an business across any industry, but email-based threats, including ransomware and Business Email Compromise (BEC), are growing exponentially as technology develops complimented by a user adoption growth and it’s difficult to keep up. Even your savviest employees can mistakenly click on a malicious link and expose your entire …

Trend Micro Cloud Email Gateway (key features) Read More »

hacker-tech-success
Scroll to Top