Breaking News

Hacking WiFi Password in a few steps using a new attack on WPA/WPA2

A security researcher has devised a new WiFi hacking technique that could be exploited to easily crack WiFi passwords of most…

8 years ago

TSMC Chip Maker confirms its facilities were infected with WannaCry ransomware

TSMC shared further details on the attack and confirmed that its systems were infected with a variant of the infamous WannaCry ransomware. Early…

8 years ago

Duo Security created open tools and techniques to identify large Twitter botnet

Researchers at security firm Duo Security have created a set of open source tools and disclosed techniques that could be…

8 years ago

Group-IB experts record a massive surge of user data leaks form cryptocurrency exchanges

Group-IB researchers have investigated user data leaks from cryptocurrency exchanges and has analyzed the nature of these incidents. Security experts…

8 years ago

HP releases firmware updates for two critical RCE flaws in Inkjet Printers

HP has released firmware updates that address two critical remote code execution vulnerabilities in some models of inkjet printers. HP…

8 years ago

Fortnite APK is coming soon, but it will not be available on the Google Play Store

Fortnite, the most popular game will be soon available for Android users but the Fortnite APK will not be in…

8 years ago

Dept. of Energy announced the Liberty Eclipse exercise to test electrical grid against cyber attacks

DoE announced the Liberty Eclipse exercise to test the electrical grid 's ability to recover from a blackout caused by…

8 years ago

TCM Bank: website misconfiguration exposed applicant data for 16 months

TCM Bank announced that a Web site misconfiguration exposed applicant data for 16 months, between early March 2017 and mid-July 2018…

8 years ago

ZombieBoy, a new Monero miner that allows to earn $1,000 on a monthly basis

A security researcher discovered a new crypto mining worm dubbed ZombieBoy that leverages several exploits to evade detection. The security researcher James Quinn…

8 years ago

Tech Support Scams improved with adoption of Call Optimization Service

Security experts from Symantec are warning of tech support scams abusing Call Optimization Services to insert phone numbers. Crooks are improving…

8 years ago

This website uses cookies.