A team of experts showed that a simple sticker attached on a sign board can confuse any self-driving car and potentially…
The FBI used a NIT involving a specially crafted video file to unmask a sextortionist that via Tor was threatening…
Many times we have seen in movies hackers and spies breaking electronic locks with any kind of electrical equipment. Is…
The Irish electricity transmission system operator EirGrid was targeted by a state-sponsored actor, the hackers weren't discovered at least for…
The Horus scenario, is a scenario describing a large scale cyber attack targeting the vital electrical infrastructure triggering flaws found…
The US Army has ordered its units to stop using Chinese DJI drones because of "cyber vulnerabilities" in the products.…
Microsoft released a new security update on June 17th in an attempt to patch a vulnerability which allowed the Stuxnet…
Black Hat 2017 - Security experts develop GitPwnd, a tool that could be used by attackers to communicate with compromised…
Wikileaks published a new batch of files belonging to the CIA Vault 7 archive that reveals the 'Dumbo' tool used…
Former Employee of the Healthcare giant Bupa offered for sale records of 1 Million clients on Dark Web. A former…
This website uses cookies.