Hacking

Meet PinME, A Brand New Attack To Track Smartphones With GPS Turned Off.

Researchers from Princeton University have developed an app called PinME to locate and track smartphone without using GPS. The research…

8 years ago

Automated Hacking Tool Autosploit Cause Concerns Over Mass Exploitation

The Autosploit hacking tool was developed aiming to automate the compromising of remote hosts both by collecting automatically targets as well…

8 years ago

9 Tips to Prevent WordPress Hacks in this Dangerous Digital World

WordPress hacks are increasingly common. Whether it’s for malicious reasons, to harm a site or to just insert backlinks, WordPress…

8 years ago

Adobe rolled out an emergency patch that fixed CVE-2018-4878 flaw exploited by North Korea

Adobe rolled out an emergency patch that fixed two critical remote execution vulnerabilities, including the CVE-2018-4878 flaw exploited by North…

8 years ago

Researchers ported the NSA  EternalSynergy, EternalRomance, and EternalChampion to Metasploit

Security researcher Sean Dillon ported three NSA-linked exploits, EternalSynergy, EternalRomance, and EternalChampion, to the Metasploit platform. The security researcher at RiskSense Sean…

8 years ago

Abusing X.509 Digital Certificates to establish a covert data exchange channel

Researcher at Fidelis Cybersecurity devised a new technique that abuses X.509 Digital Certificates to establish a covert data exchange channel…

8 years ago

ADB.Miner, the Android mining botnet that targets devices with ADB interface open

Security researchers at Qihoo 360's Netlab have spotted a new Android mining botnet that targets devices with ADB interface open. Security…

8 years ago

Cisco and FireEye Pointing Finger at North Korea Hacking Group For Adobe Flash 0-Day In The Wild

According to security researchers at Cisco and FireEye a North Korea Hacking Group is behind the attacks that exploited the…

8 years ago

Almost all WordPress websites could be taken down due to unpatched CVE-2018-6389 DoS flaw

The Israeli security researcher Barak Tawily a vulnerability tracked as CVE-2018-6389 that could be exploited to trigger DoS condition of WordPress…

8 years ago

Hacking Amazon Key – Hacker shows how to access a locked door after the delivery

Other problems for the Amazon Key technology, a hacker posted a video on Twitter to show how to access a…

8 years ago

This website uses cookies.