Once again a zero day vulnerability exploit is sold by cyber criminals in the underground, once again a the flaw is related to Oracle’s Java software that could allow to gain remote control over victim’s machine.The news has been reported by KrebsOnSecurity blog that announced that the exploit being sold on an Underweb forum. Continue reading
Researchers over at Intego have recently discovered a new variant of OSX/Imuler the data-stealing Mac malware, detected as OSX/Imuler.E which is believed to be targeting Tibetan rights activists.
Self-employed. Freelancer. Entrepreneur. Business owner. However you label it, these people are making an independent living by themselves and their businesses they have built.
These “labels” often blend into one another: those who are self-employed consider themselves business owners, business owners consider themselves entrepreneurs, freelancers consider themselves self-employed. For those who enjoy making a living from something they have built, they may label themselves all of the above. Continue reading
Bug Bounty program, where white hat hackers and researchers hunt for serious security vulnerabilities and disclosing them only to the vendor for patch , In return vendors reward them with money. Continue reading