Breaking News

How does the ISIS control the Internet?

The ISIS, exactly as any other government, has adopted measures to control the access to the Internet in the territories…

10 years ago

A few hours the Paris attacks, a new ISIS propaganda hub appeared on the Darknet

The popular security expert Scot Terban (aka @krypt3ia ) discovered a few hours after the Paris attacks, a new ISIS…

10 years ago

Twittor tool uses Twitter direct messages to control botnets

Twittor is a tool open source that was designed by the London-based researchers Paul Amar to control botnets via Direct Messages. Twittor is…

10 years ago

Anonymous announced #OpParis against the ISIS in response to the Paris attacks

Anonymous launched the #OpParis to track terrorists online. We are Anonymous. We are Legion. We do not forget. We do…

10 years ago

Did terrorists use PlayStation 4 for communications in Paris attacks?

Rumors circulating on the Internet sustain that terrorists behind the Paris attacks have used PlayStation 4 for their communications. The…

10 years ago

Security Affairs newsletter Round 35 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

10 years ago

Russia has a new anti wiretapping System

A Russian manufacturer has built an advanced system for the protection of any channels of telephone communication against wiretapping. The…

10 years ago

Flaw in the Android Gmail app opens to email spoofing attacks

A security loophole in the official Gmail Android app opens the email spoofing attacks allowing anyone to change the sender…

10 years ago

You can buy a Cryptolocker/Cryptowall Ransomware Kit for $3,000

Experts at BitDefender have discovered a Cryptolocker/Cryptowall Ransomware Kit offered for sale at $3,000, source code included. Yesterday I wrote…

10 years ago

Chrome exploit leaves million Android devices open to attack

At the MobilePwn2Own, a Chinese expert has demonstrated how to hijack an Android smartphone by exploiting a zero-day flaw in…

10 years ago

This website uses cookies.