Security researchers have presented proof-of-concept code capable of accessing the database driving a Microsoft ERP system and then diverting funds while avoiding immediate detection. Tom Eston and Brett Kimmel of vendor SecureState ...
Tags: highlightedpost, Microsoft, Microsoft ERP, Security researchers
Some Web browsers can be tricked into using so-called malicious extensions that can give hackers the ability to hijack the user's session,spy on webcams,upload and download files,and in the newer mobile-device area,hack into Google Android ...
Tags: zombie browsers, malicious extensions, advanced persistent threat, Chrome