Breaking News

‘Hacking Team’ and heterogony of ends: how the hack of Phineas Fisher can lead to unwanted worst consequences for the evolution of the Surveillance Tools and State Spyware.

The “heterogony of end” is a famous expression formulated in 1886 by the German philosopher Wihelm Wundt, what about the…

10 years ago

North Korean Hackers stole defense documents and photos from South

The Government of Seoul reported that North Korean Hackers stole defense-related documents and photos from two South Korean companies. The…

10 years ago

Singapore will isolate Government Computers from the Internet

The Government of Singapore will cut off civil servants' work computers from the Internet in order to secure Government networks.…

10 years ago

Exclusive: Critical vulnerability found on Twitter?

The newfound critical vulnerability on Twitter seems to allow remote code execution! Which is the reason behind the recent Twitter…

10 years ago

The NSA wants to exploit IoT devices for surveillance and sabotage

The NSA and other intelligence agencies are spending a significant effort in research for hacking IoT devices for both surveillance…

10 years ago

WauchulaGhost targets ISIS Twitter Accounts and floods them with porn images

WauchulaGhost Hacker groups linked to Anonymous hijack ISIS supporters' Twitter accounts and flood their profiles with PORN picture and irreverent…

10 years ago

Security Affairs newsletter Round 64 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

10 years ago

How to bypass two-factor authentication with a text message

Is Two-factor authentication the solution for any kind of hacks? A text message could be used to take over your…

10 years ago

How to recover files encrypted by all Teslacrypt Ransomware variants

Experts from Cisco Talos team have improved their decryptor tool to allow the recovery of files encrypted by all the…

10 years ago

Bolek Banking Trojan, a Carberp Successor is spreading in the wild

The Bolek banking Trojan is one of the successors of the notorious Carberp Trojan that targets both 32-bit and 64-bit…

10 years ago

This website uses cookies.