We are obviously researching on malware and system vulnerabilities that have existed and those emerging. The recent cyber attacks have been an eye opener for us here at cod.e
After finding the reference to this domain in the Trojan’s code, the researcher registered the domain, thus suspending the attack. In the remainder of the day, the domain was addressed tens of thousands of times, which means that tens of thousands of computers were spared.
These numbers all support the fact that connected media and devices are now an integral part of daily life for most people around the world. In particular, smartphones have brought connectivity to more than half of the world’s population, so it’s time for businesses, NGOs, and governments everywhere to stop thinking of digital, social, and mobile as ‘new’ or ‘emerging’ media.
The hack tricks unsuspecting users into opening infected Word documents which subsequently run malicious macros once the file has been loaded.
By attacking business networks, servers and devices, hackers are accessing secrets and confidential strategies and creating huge losses for the overall economy.
If an attacker can control and manipulate the accounting system of the company to commit mass systems fraud, it can create more devastating and long term consequences for the company…
Bitcoin mining isn’t so much about discovering new bitcoins like a gold miner searches for gold. Bitcoin mining is all about being rewarded for validating the authenticity of pending bitcoin transactions.
With over 80 speakers, 12 workshops, a myriad of attendees across different Technology facets and four days of engagements surely does offer a great opportunity to learn.
WikiLeaks beguns its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.
Having the right ingredients for innovation to flourish on a scale similar to Silicon Valley will take more than stealing the moniker.