Breaking News

SAP Download Manager flaw exposed user password

An attacker who manages to get access to a user's configuration file for SAP Download Manager might be able to…

10 years ago

Adobe issues emergency out-of-band update for actively exploited 0Day

Adobe has released an emergency out-of-band update to fix a zero-day vulnerability that is being used in targeted attacks. It's…

10 years ago

0-day critical flaws in mobile modems allow hackers to take over your PC

The Russian security tester Timur Yunusov has discovered critical flaw affecting routers and 3G and 4G mobile modems from Huawei,…

10 years ago

How to hack mobile phones embedded fingerprint sensor using 2D Printed fingerprints

Two Computer Science researchers developed a technique to hack a phone's fingerprint sensor in 15 mins with $500 worth of…

10 years ago

Triada Trojan the most sophisticated mobile malware seen to date

Kaspersky Lab recently spotted a new Android malware dubbed Triads Trojan, which they say is the most advanced mobile malware…

10 years ago

Snowden FBI is lying, it can already unlock iPhone without Apple support

Snowden accuses the FBI of lying about his ability to unlock the iphone of the San Bernardino terrorist. "that’s horse…

10 years ago

ISIS – Disclosed thousands of files reporting the identity of 22,000 Jihadis

A former ISIS member has stolen and disclosed thousands of documents reporting the identity of 22,000 Jihadis and other important…

10 years ago

Tracking users on the Tor Network through mouse movements

A security researcher has devised a new technique to track users by analyzing the mouse movements, even when surfing on…

10 years ago

Bangladesh says hackers stole $100 Million from its US Federal Reserve account

Unknown hackers have stolen more than $100 million from the Bangladesh Bank account at the US Federal Reserve Bank. According…

10 years ago

More than a billion Android devices are easy to hack

A large percentage of Android devices is affected by security vulnerabilities that could be exploited by attackers to easily gain…

10 years ago

This website uses cookies.