Breaking News

Ransomware attacks paralyzed at least two German hospitals

New ransomware infections hit Germany hospitals, at least two structures were infected by the dreaded malware. New ransomware infections hit…

10 years ago

Wikileaks – NSA tapped world leaders for US geopolitical Interests

The NSA tapped world leaders for US Geopolitical Interests, including a conversation between Netanyahu-Berlusconi over the U.S.-Israel Relations. A couple…

10 years ago

Discover how many ways there were to hack your Apple TV

Apple has patched more than 60 vulnerabilities affecting the Apple TV, including flaws that can lead to arbitrary code execution…

10 years ago

Cisco fixes Command Injection vulnerability in CISCO ACE 4710 products

Cisco has released security updates for the products CISCO ACE 4710 appliance to fix a high severity command injection vulnerability.…

10 years ago

The DoD funded the Carnegie Mellon University’s research on Tor Hacking

A judge has confirmed that US Departement of Defense funded the Carnegie Mellon University to conduct research on the Tor…

10 years ago

The new iPhone designed by Apple will be unhackable

Apple has begun developing security features for the new iPhone to make it impossible for the law enforcement agencies to…

10 years ago

Author of the Angler EK integrated recently Silverlight exploit

The security researcher Kafeine confirmed that the authors of the Angler EK have integrated the exploit for a recently patched…

10 years ago

Operation Blockbuster revealed the Lazarus Group Activities

The Operation BlockBuster Coalition has disclosed the results of its investigation on the activities of the Lazarus Group that is…

10 years ago

Remotely hacking a Nissan LEAF via vulnerable APIs

The security expert Troy Hunt discovered that it is possible to remotely control features of a Nissan Leaf via API.…

10 years ago

Mousejack attack – Hijack Wireless Mouse/Keyboard Dongles from 100 meters to control PCs

Mousejack attack - Researchers at Bastille firm demonstrated how to hack computers by exploiting a flaw in many wireless mouse…

10 years ago

This website uses cookies.