Breaking News

Guccifer 2.0 leaks personal data of nearly 200 Congressional Democrats

Guccifer 2.0, the alleged hacker behind the DNC hack released another trove of documents about House Democrats, including Nancy Pelosi's…

10 years ago

Safe Browsing, Gmail will warn of emails from unauthenticated senders

Google announced a new feature in the Safe Browsing warning set, it will warn users when they will receive an…

10 years ago

Scylex malware Kit offered for sale in the criminal underground

Experts from Heimdal security firm discovered a new crimeware kit, the Scylex malware kit, that aims to provide Zeus-grade Capabilities.…

10 years ago

DiskFiltration Stealing data from air-gapped networks via acoustic signals

A group of experts devised a technique dubbed DiskFiltration to exfiltrate data from air-gapped networks relying on acoustic signals emitted…

10 years ago

Are voting machines easy to hack? Yes, because they are outdated

Is it possible to hack voting machines? According to cyber security experts, it is possible due to the use of…

10 years ago

Information warfare – The Rise of the Cyber Offense

Information warfare - The development of cyber capabilities is strategic for any governments, computer systems and Internet of Things even…

10 years ago

How to open 100 Million Volkswagen cars with a cheap wireless device

A new hack leveraging on two distinct vulnerabilities could be exploited to open every Volkswagen vehicles that have been sold…

10 years ago

Patch your vBulletin forum asap to avoid being hacked

vBulletin forums need to be patched asap to avoid attackers to scan servers hosting the CMS and remotely execute arbitrary…

10 years ago

Hacker Interviews – RootPhantom from Phantom Squad

Today I have interviewed RootPhantom, another member of the popular hacker crew Phantom Squad. Enjoy the interview!   You are…

10 years ago

Serious Linux design flaw CVE-2016-569 allows Traffic Hijacking

A severe design flaw in the Linux kernel could be exploited by attackers to hijack traffic, inject malware into connections,…

10 years ago

This website uses cookies.