Profile cover photo
Profile photo
Koddos
10 followers -
Enterprise-Grade DDoS protection and hosting
Enterprise-Grade DDoS protection and hosting

10 followers
About
Posts

Post has attachment
Public
A Google engineer discovered that certain Apple apps could access victims’ cameras to conduct espionage. Apple devices were once considered the gold standard of security measures; a device impenetrable by common threats that frequently plague Android…
Add a comment...

Post has attachment
Public
The communications company confirmed that they warned a few hundred users about hackers hijacking SIM cards. T-Mobile has confirmed that hundreds of their users had been targeted by hackers recently where hackers tried to hijack the users’ SIM cards.…
Add a comment...

Post has attachment
Public
A group of researchers recently discovered several vulnerabilities in the software employed by thousands of maritime ships across the world. Earlier this week, a group of researchers from IOActive revealed their analysis of the popular AmosConnect 8.0.…
Add a comment...

Post has attachment
Public
Cybersecurity experts warned that the Reaper Botnet can compromise all internet-connected devices. This past year has seen a dramatic increase in cyber attacks. The most recent attack, the Bad Rabbit attack, managed to affect large areas of Russia and the…
Add a comment...

Post has attachment
Public
The latest Bitcoin fork project’s website suffered extensive damages after a huge DDoS attack. The latest Bitcoin fork project, Bitcoin Gold (BTG) officially forked from the bitcoin blockchain last night at midnight. The project has been controversial…
Add a comment...

Post has attachment
Public
A DDoS attack launched by unknown hackers caused two Czech parliamentary election sites to be down this past weekend. Two websites dedicated to electing new parliamentary members in the Czech Republic, volby.cz, and volbyhned.cz, experienced a temporary…
Add a comment...

Post has attachment
Public
Le logiciel de simulation de conduite est continuellement développé et optimisé pour diverses applications pour les élèves et les automobilistes. Il permet l’interaction entre le conducteur, le véhicule et l’environnement de la circulation. Le logiciel de…
Add a comment...

Post has attachment
Public
The US Government issued a rare warning which confirmed that hackers were infiltrating several networks of firms in these industries. The US Government has recently issued a warning that a group of sophisticated hackers has been targeting firm networks in…
Add a comment...

Post has attachment
Public
Hackers used a malware-infected media player to compromise Mac operating systems. Security researchers recently revealed that malicious attackers managed to infiltrate and compromise the website of a company that develops popular apps for Macs. This…
Add a comment...

Post has attachment
Public
La gestion de la base de membres dans une association est l’un des paramètres non négligeables de la gestion d’association. Il existe plusieurs méthodes pour assurer une bonne gestion de ce volet de l’association. Ce sont les membres qui font…
Add a comment...
Wait while more posts are being loaded