Guccifer 2.0, the alleged hacker behind the DNC hack released another trove of documents about House Democrats, including Nancy Pelosi's…
Google announced a new feature in the Safe Browsing warning set, it will warn users when they will receive an…
Experts from Heimdal security firm discovered a new crimeware kit, the Scylex malware kit, that aims to provide Zeus-grade Capabilities.…
A group of experts devised a technique dubbed DiskFiltration to exfiltrate data from air-gapped networks relying on acoustic signals emitted…
Is it possible to hack voting machines? According to cyber security experts, it is possible due to the use of…
Information warfare - The development of cyber capabilities is strategic for any governments, computer systems and Internet of Things even…
A new hack leveraging on two distinct vulnerabilities could be exploited to open every Volkswagen vehicles that have been sold…
vBulletin forums need to be patched asap to avoid attackers to scan servers hosting the CMS and remotely execute arbitrary…
Today I have interviewed RootPhantom, another member of the popular hacker crew Phantom Squad. Enjoy the interview! You are…
A severe design flaw in the Linux kernel could be exploited by attackers to hijack traffic, inject malware into connections,…
This website uses cookies.