Breaking News

How to silently control a mobile phone from 16 Feet Away

Two researchers from the French Intelligence Agency ANSSI discovered that hackers can control a mobile device remotely using the personal…

10 years ago

Pangu cracking team has released the iOS 9 jailbreak

The Chinese jailbreaking team Pangu has just released a software (iOS 9 jailbreak) that allows Apple users to jailbreak their…

10 years ago

Google records and maintains all our voice searches

Google listens and records our voice searches, but the majority of the users ignores it. I'll explain how to listen…

10 years ago

FIN5 hacking crew steals 150,000 credit cards from casino

FireEye has uncovered a new hacking group dubbed FIN5 hacked payment systems of an un-named Casino and it has stolen…

10 years ago

Espionage campaign relying on the Zeus Trojan targets the Israeli Public Sector

Check Point discovered a series of malware-based attacks on Israeli public sector organizations that were infected by the Zeus Trojan…

10 years ago

Malware-based attack targets America’s Thrift Stores

America’s Thrift Stores announced on Friday that payment information of a part of its customers might have been stolen by…

10 years ago

The rise of the Japanese Cybercrime Underground

Researchers at Trend Micro have issued a new report on the Japanese Cybercrime Underground, a growing criminal community with his…

10 years ago

MEF – Annual Report 2015 – Payment card frauds

The CENTRAL MEANS OF PAYMENT ANTIFRAUD OFFICE (UCAMP) of the Italian Ministry of Economy and Finance released the annual report…

10 years ago

NSA SHARKSEER program aims to detect and mitigate malware Zero-Day

The NSA SHARKSEER Program is a project that aims to detect and mitigate web-based malware Zero-Day and Advanced Persistent Threats…

10 years ago

USB Killer 2.0 – How to easily burn a PC with a USB device

In March I presented the PoC of a computer-frying Killer USB pendrive designed by the Russian researcher, now the USB…

10 years ago

This website uses cookies.