Skip to content

Security and tech news with Xploiter.com

Be Safe, Be Secure

Category: Mirai

Posted on June 20, 2017

IoT Malware Activity Already More Than Doubled 2016 Numbers

The number of new malware samples in the wild this year targeting connected internet-of-things (IoT) devices has already more than doubled last year’s total.

Posted on June 15, 2017

Post-WannaCry, 5.5 Million Devices Still Expose SMB Port

In its annual National Exposure Index report, Rapid7 found 160 million computers, IoT devices and servers with open ports that should not be exposed to the public network.

Posted on June 7, 2017

InfoSec 2017: ‘One disaster away from governments doing something’ on IoT

IoT is ‘eating the world’, warned Bruce Schneier at InfoSec 2017 – and it’s up to us to make sure that the inevitable regulation is smart, not stupid

Posted on May 23, 2017

Trump’s Cybersecurity Boss Talks Priorities

The country’s top cybersecurity boss said the country is headed the wrong way when it comes to cybersecurity.

Posted on May 3, 2017

DDoS Attacks Can Cost Businesses Up to $2.5M Per Attack, Report Says

Neustar’s annual DDoS attack report says businesses can lose $2.5M on average detecting and mitigating DDoS attacks.

Posted on April 20, 2017

The IoT malware that plays cat and mouse with Mirai

A botnet dubbed Hajime uses much the same tactics as Mirai – but to neutralise the damage done. Is this a good thing, though?

Posted on April 1, 2017

Android under siege from malware – here’s how to protect your phone

Android phones are a top attack target, making up 85% of all mobile device infections in the second half of 2016

Posted on March 31, 2017

Threatpost News Wrap, March 31, 2017

This year’s Security Analyst Summit is previewed and the news of the week is discussed, including a Microsoft IIS zero day, a new Mirai variant, and the broadband privacy ruling.

Posted on January 20, 2017

The Mirai DDoS botnet: Brian Krebs claims to know who wrote it

How do you trace the source of an attack that came from network devices located all around the globe? Krebs thinks he’s done it…

Posted on December 17, 2016

Threatpost News Wrap, December 16, 2016

Mike Mimoso and Chris Brook discuss the news of the week including Yahoo’s latest breach announcement, a DDoS-for-hire crackdown, hackers seeking help with Mirai, and some new Adobe patches.

Posts navigation

Page 1 Page 2 Next page

Recent Posts

  • Health trust rapped on illegal use of patient data in Google AI deal
  • GDPR: who needs to hire a data protection officer?
  • News in brief: China tightens Great Firewall; student charged over DDoS attacks; health data posted online
  • Now Any Florida Resident Can Challenge What Is Taught In Public Florida Schools
  • Court Blocks EPA Effort To Suspend Obama-Era Methane Rule

Recent Comments

  • Eric Plambeck on An Assembly Language Primer(C) 1983 by David Whitman
  • Frank van Bommel on Delphi Tips
  • Simon Steed on URL Rewriting in Asp.net using URLRewriter
  • Simon Steed on URL Rewriting in Asp.net using URLRewriter
  • sen on URL Rewriting in Asp.net using URLRewriter

Archives

  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • September 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
  • October 2010
  • September 2010
  • August 2010
  • March 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • August 2009
  • July 2009
  • June 2009
  • May 2009
  • April 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008

Categories

  • 2FA
  • angler
  • car hacking
  • certificate authorities
  • chrome
  • Cisco systems
  • Cisco Telepresence
  • Cloud Security
  • Critical Infrastructure
  • Cryptography
  • DDoS
  • DMCA
  • exploit kit
  • Facebook
  • Gmail
  • google
  • Google Transparency Report
  • Government
  • HackerOne
  • Hacks
  • HTTPS
  • ICS
  • IoT
  • IoT botnet
  • IoT devices
  • IoT security
  • IT
  • Javascript
  • Kevin Beaumont
  • Locky
  • malicious JavaScript
  • Malware
  • Microsoft
  • Mirai
  • Mirai botnet
  • Mirai malware
  • Mobile Security
  • mobile spyware
  • Neutrino
  • Nuclear
  • open source software
  • Pegasus
  • Privacy
  • ransomware
  • RIG Exploit Kit
  • SCADA
  • Schneider Electric
  • Science
  • Spyware
  • SSL
  • Uncategorised
  • Uncategorized
  • Vulnerabilities
  • Web Security
  • zero day vulnerability

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Pages

  • A List Of Rules That Every C Programmer Should Follow
  • A tutorial on I/O Streams
  • A TUTORIAL ON POINTERS AND ARRAYS IN C
  • An Assembly Language Primer(C) 1983 by David Whitman
  • C Frequently Asked Questions (FAQ) Full Version
  • C/C++ Null Pointers
  • C++ Operators by John M. Dlugosz
  • C++ Overview by John Tal
  • comp.lang.c Answers to Frequently Asked Questions (FAQ List)
  • Delphi Tips
  • Delphi Tutorial – Lesson 1 12/29/98 Frank Fortino ffortino@svn.net Copyright 1999
  • Delphi Tutorial – Lesson 2 More Delphi Stuff 1/4/99 Frank Fortino ffortino@svn.net Copyright 1999
  • General Steps in Converting C applications to C++
  • Home
  • How to do things in Visual Basic
  • IBM Personal Computer Assembly Language Tutorial
  • LocalSQL.hlp as HTML File
  • Privacy Policy
  • Programming in C – a shortish tutorial by Toto
  • Sample Page
  • Using the Debug Command (dos)
  • Write simple scripts in PERL (CGI)
Privacy Policy Proudly powered by WordPress
Got a hot tip? Send it to us!
[contact-form-7 404 "Not Found"]
Got a hot tip? Send it to us!
[contact-form-7 404 "Not Found"]