Hacking

PostgreSQL issues three security patches, apply them asap

PostgreSQL has issued three security patches for 9.6.4, 9.5.8, 9.4.13, 9.3.18, and 9.2.22 versions. Update them as soon as possible.…

8 years ago

OpDomesticTerrorism – Anonymous takes down Charlottesville website after the incident

Anonymous launched the OpDomesticTerrorism and claimed responsibility for carrying out a DDoS attack on the website of Charlottesville city Virginia. The…

8 years ago

Kenya opposition claims election results manipulated in cyber attack

Kenya opposition claims hackers have manipulated the results of the recent election by breaking into the database of Kenya's electoral commission. According…

8 years ago

Crosstalk Leakage Attacks – USB gadgets can spy on data flowing in and out adjacent ports

Crosstalk Leakage Attacks - Experts demonstrated that USB gadgets can secretly spy on data flowing in and out of devices…

8 years ago

DNA Contains Instructions for Biological and Computer Viruses

University of Washington scientists have created an experiment that shows how DNA can be used to not only create biologic…

8 years ago

Variety reports a failed attempt of HBO to Offer a ‘Bug Bounty’ to hackers

According to a report from a leaked memo by Variety, in response to the incident, HBO offered a reward of $250,000, a…

8 years ago

Malware campaign targets Russian-Speaking companies with a new Backdoor

Trend Micro spotted a new espionage campaign that has been active for at least 2 months and that is targeting Russian-speaking…

8 years ago

Mysterious company is offering up to $250,000 for VM Hacks through a bug bounty

A mysterious company is offering up to $250,000 for virtual machine (VM) hacks. The “secret” bug bounty program was announced by Bugcrowd.…

8 years ago

Wikileaks – CIA CouchPotato remote tool can stealthy collect RTSP/H.264 video streams

WikiLeaks has published another Vault 7 leak, revealing the CIA tool CouchPotato that allows operators to remotely spy on video…

8 years ago

Experts found a link between the KONNI attacks and DarkHotel campaigns against NK

Experts at Cylance noticed that the decoy document used in KONNI attacks is similar to the one used in recent campaigns of…

8 years ago

This website uses cookies.