Breaking News

New Tor Browser 7.0 implements multiprocess mode, content sandbox, and Unix domain sockets

The Tor Project Team has announced the release of Tor Browser 7.0, it comes with multiprocess mode, content sandbox, and…

9 years ago

Platinum hackers leverages Intel Active Management tools to bypass Windows firewall

The PLATINUM hacker group has developed a system leveraging Intel Active Management Technology (AMT) to bypass the Windows firewall. Microsoft…

9 years ago

Al-Jazeera claims to be facing a large-scale cyber attack due to Qatar crisis

Al-Jazeera claims to be the victim of a large-scale cyber attack as Qatar crisis continues. The attack comes after the…

9 years ago

F-Secure experts found multiple flaws in popular Chinese Internet-connected cameras

Experts at F-Secure discovered tens of vulnerabilities in tens of thousands of Internet-connected cameras from China-based manufacturer Foscam. Security experts…

9 years ago

Comey hearing: Former FBI director talks about Russia interference in US Presidential Election

Former FBI Director Comey hearing: Comey Has 'No Doubt' on the Russia's Involvement in cyber attacks against 2016 US Presidential…

9 years ago

A new Linux Malware targets Raspberry Pi devices to mine Cryptocurrency

Security researchers at Dr. Web discovered two new Linux Malware, one of them mines for cryptocurrency using Raspberry Pi Devices.…

9 years ago

Turla APT malware now retrieves C&C address from Instagram comments

A malicious code used by Turla APT in a recent campaign leverages comments posted to Instagram to obtain the address…

9 years ago

US intelligence officials believe Russian Hackers are behind the Qatar hack

US intelligence officials believe Russi-linked hackers are behind the Qatar hack and used false news to prompt a diplomatic crisis…

9 years ago

Russia-linked hacker group APT28 continues to target Montenegro

Once again, Montenegro was targeted by the Russia-linked hacker group APT28, according to the experts it is just the beginning.…

9 years ago

Exfiltrating data from Air-Gapped Networks via Router LEDs

A team of Israeli researchers has devised a new technique to exfiltrate data from a machine by using a malware…

9 years ago

This website uses cookies.