Skip to content
IT Security Magazine

IT Security Magazine

Information Technology Security News

  • Home
  • IT Security
    • IT Security News
    • Computer Security
    • Network Security
    • Network Monitoring
    • Cyber Security
    • Security & Privacy
  • IT Security Articles
  • Security Software
  • Security Magazines
  • About

Month: January 2014

Syrian Electronic Army stole docs from Microsoft

January 28, 2014 V.Kankanyan Cyber Security, IT Security News, Security & Privacy
syrian electronic army

Syrian Electronic Army stole docs from Microsoft. After compromising Microsoft’s official blog and Twitter account last month, the Syrian Electronic Army (SEA) sifted through employees emails to acquire documents related to law enforcement inquiries. The




Read more

Unvalidated Redirection Vulnerability in Kaspersky website

January 27, 2014 V.Kankanyan Cyber Security, IT Security, IT Security News
kaspersky

Unvalidated Redirection Vulnerability in Kaspersky website has found by security expert Ebrahim Hegazy, Cyber Security Analyst Consultant at Q-CERT. According to Ebrahim blog post, the “Unvalidated Redirection Vulnerability” in the website of the well known Antivirus and Internet Security




Read more

Yahoo Hacked!

January 27, 2014 V.Kankanyan Cyber Security, IT Security News
yahoo hacked

Cyber Security Expert and Penetration tester, Ebrahim Hegazy has found a serious vulnerability in Yahoo’s website that allows an attacker to remotely execute any commands on the server i.e. Remote Command Execution vulnerability. According to Ebrahim blog




Read more

CBI arrests Indian mastermind behind Hire a Hacker service on FBI tip-off

January 25, 2014 V.Kankanyan IT Security News
hire a hacker

For the first time in history, Indian Law Enforcement Agency ‘Central Bureau of Investigation’ (CBI) has arrested a Cyber criminal behind Hire a Hacker service after getting a tip-off from the US Federal Bureau of Investigation




Read more

CNN’s Twitter, Facebook and website hacked by Syrian Electronic Army

January 25, 2014 V.Kankanyan IT Security News
cnn website hacked by sea

A number of CNN’s social media accounts and blogs, including CNN’s Twitter, Facebook and website hacked by Syrian Electronic Army. The affected accounts included CNN’s main Facebook account, CNN Politics’ Facebook account and the Twitter




Read more

Posts navigation

1 2 3 Next Posts»

Recent Posts

  • Hackers Infected 30000 Routers in India with Cryptocurrency Mining Malware
  • Palestinian Hackers hacked the Israel Defense Magazines subscriber email list
  • Names and Social Security numbers of about 9700 Marylanders with disabilities were exposed
  • Bitcoin Exchange Poloniex website hacked
  • Forbes website hacked by the Syrian Electronic Army

Categories

  • Computer Security
  • Cyber Security
  • IT Security
  • IT Security Articles
  • IT Security News
  • Network Monitoring
  • Network Security
  • Security & Privacy
  • Security Software

Featured Software

Nsauditor Network Security Auditor
Network Security Auditing for possible vulnerabilities.Over 45 net tools.
Nsauditor is an advanced network security scanner for auditing and monitoring network computers for possible vulnerabilities. The software checks network computers using all potential methods that a hacker might use to attack it.
Buy Now | Download | Learn More

SpotAuditor
SpotAuditor is password recovery software, recovers over 40 programs passwords.
SpotAuditor is an advanced password recovery software for recovering over 40 programs passwords, including: Google Chrome, Internet Explorer, Firefox, Opera, FTP, hotmail, Microsoft Office Outlook passwords, recovers passwords behind the asterisks.
Buy Now | Download | Learn More

Product Key Explorer
Product Key Explorer recovers product keys from local or network computers.
Product Key Explorer is a powerful product key find and product key recovery software for Windows, Microsoft Office, SQL Server, Nero, Adobe CS3,CS4,CS5,CS6 and +10000 other software. It recovers product keys from local or network computers.
Buy Now | Download | Learn More

Tags

Computer Security cryptojacking Cyber Security hacking Information Security IT Security IT Security Articles IT Security News malware monero Network Monitoring network security network security auditing Security & Privacy security policy

Archives

  • October 2018
  • March 2014
  • February 2014
  • January 2014
WordPress Theme: zeeDynamic by ThemeZee.