Breaking News

Hacking enterprise wireless Printers with a drone or a vacuum cleaner

A group of researchers from the iTrust has demonstrated how to use a Drone to intercept wireless printer transmissions from…

10 years ago

Don’t throw away your old Boarding Pass, it may contain personal information

Don’t throw away your old Boarding Pass, it may contain personal information that could allow attackers to run targeted attacks…

10 years ago

The Angler Exploit Kit Exposed: Making $60 Million Annually by Delivering Ransomware

The Cisco Talos Group has performed in-depth research on the threat actors behind the Angler Exploit Kit, and even had…

10 years ago

Experts discovered the attack platform used by the Winnti Group

Experts at Kaspersky have discovered that Winnti Group has enhanced its attack platform infecting organizations in South Korea, UK and…

10 years ago

The Smurf Suite – GCHQ can hack your phone with a text message

Snowden told the BBC's Panorama that the GCHQ has developed a hacking suite dubbed Smurf Suite, it can hack any…

10 years ago

Civil nuclear facilities worldwide at risk of cyber attack

The nuclear industry is still unprepared to respond cyberattacks exposing civil nuclear facilities worldwide at risk of cyber attacks. Civil…

10 years ago

Attackers hack into Outlook Web App (OWA) Server for access to organization network

Researchers have discovered an advanced malware that can breach organizations by infecting their Outlook Web Application (OWA) mail server. According…

10 years ago

Is the North Korea behind the attack on the Seoul Subway Operator?

According to the Government of Seoul, the North Korea is the main suspect for a cyber attack that last year…

10 years ago

YiSpecter iOS Malware can infect any Apple iOS device

Experts at Paloalto Networks discovered a strain of Apple iOS malware dubbed YiSpecter that is able to infect both jailbroken…

10 years ago

AV-Test – Which is the best Antivirus for Linux systems?

The Independent AV-Test Institute has analyzed 16 Linux security solutions against Windows and Linux threats under Ubuntu. The results are…

10 years ago

This website uses cookies.