Best Internet Security | i-AWCS Blog
Please enable Javascript in your browser.

Google Hack Honeypot

By on May 08, 2017

The role of decoy-based intrusion-detection technology, or "honeypots," is evolving. Once used primarily by researchers as a way to attract hackers to a network system in order to study their movements and behavior, honeypots are now beginning to play an important part […]

Read More Next Right arrow

Mac Software Website Hacked to Spread Malware

By on May 07, 2017

If you have recently downloaded the popular open source video transcoder app HandBrake on your Mac, there are chances that your computer is infected with a notorious Remote Access Trojan (RAT). The HandBrake team issued a security alert on Saturday, warning Mac users that one of its mirror servers to download the software has […]

Read More Next Right arrow

What is a Zero-Day Exploit ?

By on May 06, 2017

A zero-day vulnerability, at its core, is a flaw. It is an unknown exploit in the wild that exposes a vulnerability in software or hardware and can create complicated problems well before anyone realizes something is wrong. In fact, a zero-day exploit leaves NO opportunity for detection […]

Read More Next Right arrow

NSA was Targeting SWIFT Bank Network

By on April 14, 2017

The Shadow Brokers – a hackers group that claimed to have stolen a bunch of hacking tools from the NSA – released today more alleged hacking tools and exploits that target earlier versions of Windows operating system, along with evidence that the Intelligence agency also targeted the SWIFT banking sy […]

Read More Next Right arrow