Breaking News

Is your iOS device hostage? Old scam scheme used to lock mobile

A number of iOS devices are being held ransom by the Russian “Oleg Pliss” who is demanding a payment of $100…

10 years ago

NATO on Cyber Defence : Time Level Up

NATO on Cyber Defence - The cyberspace has become the new battlefield and an ingreasing number of threats leverages on…

10 years ago

JIGSAW ransomware defeated once again, decrypt your files for free

If you are one of the victims of the Jigsaw ransomware there is a good news for you, experts from…

10 years ago

NATO Warsaw summit 2016, what about cyber security?

What about cyber security issues discussed during the NATO members during the Warsaw summit held in Poland on 8 and…

10 years ago

The hidden link between the Angler EK drop and the Lurk gang

Experts from Talos team have found a link between the drop in the Angler Kit usage and the crackdown against…

10 years ago

Terrorism WEEKLY DIGEST – THREAT INTELLIGENCE FEED Jul.03-Jul.10, 2016

Terrorism - JIHADIST OPS - Jul.03-10, 2016 - This is merely an intel brief. Subscribe GII for a more comprehensive…

10 years ago

Be careful backdoored Pokemon GO Android App spotted in the wild

ProofPoint have found in the wild a backdoored version of the popular Pokemon GO Android App that could allow attackers…

10 years ago

Netia SA, the second telecom company hacked by a Ukrainian hacker

A Ukrainian Hacker has breached the servers of the Polish Telecom Company Netia SA and leaked on an underground forum…

10 years ago

Hacking mobile via hidden voice commands embedded in YouTube videos

A group of researchers has devised a new method for hacking mobile devices by using hidden voice commands in YouTube…

10 years ago

Hacker Interviews – s1ege

Today, thanks to the support of Aveek Sen, I have interviewed the hacker that goes online with the pseudonymous of…

10 years ago

This website uses cookies.