Hacking

After 3 years, Google partially fixes a bug in Android Google Chrome

Three years after its disclosure, Google has patched an information disclosure flaw in the Android version of the popular Chrome…

7 years ago

New unCaptcha automated system bypasses Google reCAPTCHA once again

The unCaptcha automated system can once again bypass Google’s reCAPTCHA challenges, despite major updates to the security service. It has…

7 years ago

Cloud Hosting Provider DataResolution.net hit by the Ryuk ransomware

The Cloud hosting provider Dataresolution.net was hit by a ransomware-based attack on Christmas Eve that took down its systems. Data Resolution LLC…

7 years ago

Hackers stole $750,000 worth Bitcoin from Electrum wallets

The latest attack of 2018 against cryptocurrency wallets and organizations in the cryptocurrency industry hit the popular Electrum wallets. Hackers…

7 years ago

Experts show that is easy to hack Hardware-based Cryptocurrency Wallets

A team of researchers demonstrated that cryptocurrency wallets Trezor and Ledger are vulnerable to several type of attacks. During the…

7 years ago

SandboxEscaper released PoC code for a new Windows zero-day

Security expert SandboxEscaper published a proof-of-concept (PoC) code for a new Windows zero-day, it is the fourth she released this…

7 years ago

Malware-based attack hit delivery chain of the major US newspapers

The LA Times revealed that a malware-based attack hits the delivery chain of the major US newspapers delaying the hardcopy…

7 years ago

‘Roma225’ campaign targets companies in the Italian automotive sector

'Roma225' campaign -The Cybaze-Yoroi ZLab researchers investigated a recent espionage malware implant weaponized to target companies in the Italian automotive…

7 years ago

Hackers bypassed vein based authentication with a fake hand

A couple of researchers demonstrated how to bypass vein based authentication using a fake hand build from a photo. If…

7 years ago

Guardzilla Security Video System Footage exposed online

A vulnerability in the Guardzilla home video surveillance system could be exploited by users to watch Guardzilla footage of other…

7 years ago

This website uses cookies.