[email protected] +603-2181 3666
Extol Threat Intelligent Notification

Panda Security announced today the launch of a new version of Panda Mobile Security, the company’s solution to combat cyber threats on mobile devices. The new Panda Mobile Security allows users to enjoy their devices with complete peace of mind, locate lost or stolen smartphones and tablets, and protect their private information thanks to the […]

With SMS we saw how the language evolved in order to save characters, now the way we express ourselves through mobile devices has experienced a new transformation. With the arrival of instant messaging apps, with WhatsApp on top, there are people who are able to communicate exclusively with emoticons. Humans move freely between images. This […]

IT News

The Trump Hotel Collection, a string of luxury hotel properties tied to business magnate and now Republican presidential candidate Donald Trump, appears to be the latest victim of a credit card breach, according to data shared by several U.S.-based banks. Trump International Hotel and Tower in Chicago. Contacted regarding reports from sources at several banks who traced a […]

I got back from REcon 2015 a week ago and I’m well and truly over the jet lag at last. As usual, it was a great conference with many interesting talks and people. It is always great to meet other reverse engineers from all over the world and discuss new techniques, tools and research. Tradition […]

“We suck at dealing with abuse and trolls on the platform”, said Dick Costolo, former CEO of Twitter, as he stepped down July 1, at the beginning of the year. This statement showed what any user of the social network already new: that Twitter regrettably fails to control harassment. A recent study carried out by […]

One night to hack in Paris
July 1, 2015

The past Saturday we had the privilege of participating in this year’s edition of “Nuit du Hack”, a French security conference which brings together professionals and amateurs of all skill levels for a series of lectures and challenges. It’s a full day (and night) of hacking goodness. A cloudy day set the perfect mood at […]

IT News

Cybercriminals have long relied on compromised Web sites to host malicious software for use in drive-by download attacks, but at least one crime gang is taking it a step further: New research shows that crooks spreading the Dyre malware for use in cyberheists are leveraging hacked wireless routers to deliver their password-stealing crimeware. Ubiquity Networks […]