Breaking News

Hacking Smart TVs remotely leveraging broadcasting signals

A security expert demonstrated how to hack SmartTV using a low-cost transmitter for embedding malicious commands into a rogue DVB-T…

9 years ago

WikiLeaks Reveals the Marble framework, used by the CIA to make hard the attribution

WikiLeaks has published the third batch of documents dubbed Marble that revealed the CIA anti-forensics tool dubbed Marble framework. WikiLeaks…

9 years ago

Turla hacking group continues to improve its Carbon backdoor

The Russian group Turla has continued to improve its Carbon backdoor, experts from ESET detected new versions released on a…

9 years ago

Samsung Galaxy S8 facial recognition system to unlock the device can be bypassed with a photo

Users can unlock Samsung Galaxy S8 phone by holding their Samsung Galaxy S8 in front of their eyes or their…

9 years ago

Owners of GitHub repositories targeted by the Dimnie data-stealer malware

Since mid-January, attackers have targeted owners of GitHub repositories with the Dimnie data-stealer malware. It is a relatively unknown threat…

9 years ago

Pro-ISIS Amaq News Site Hacked and exploited to distribute Malware

The Islamic State-affiliated Amaq news agency has been hacked and used to spread a malicious a FlashPlayer file. Who is…

9 years ago

President Donald Trump is going to extend by one year the Executive Order 13694

US President Trump is extending by one year special powers introduced by President Obama with the Executive Order 13694 on…

9 years ago

Are you searching for stolen US University email credentials? Search on the Dark Web

According to a new research published by the nonprofit DCA, millions of stolen US University email credentials are available for…

9 years ago

Nuclear Bot source code leaked online, a new threat will rapidly spread in the wild

The source code for a new banking Trojan dubbed Nuclear Bot was leaked online, experts speculate a rapid diffusion of…

9 years ago

Imperva observed a new variant of the Mirai botnet unleashes 54-Hour DDoS attack

According to security experts at Imperva, a newly discovered variant of the Mirai botnet was used to power a 54-hour…

9 years ago

This website uses cookies.