Hacking

Hackers can completely hijack a mobile device via replacement of a touchscreen

Hackers can hijack mobile devices by hiding malicious chips in a touchscreen and other components that are replaced. According to a…

8 years ago

The Ukrainian central bank warned of new NotPetya-style massive attack risk

The Ukrainian central bank warned state-owned and private lenders of the appearance of new the NotPetya-like attack that would target…

8 years ago

Misconfigured AWS S3 exposed 1.8 million US voter records

More than 1.8 million voter records belonging to Americans have been accidentally leaked online by a US voting machine supplier for dozens…

9 years ago

Hacker published the decryption key for the Apple Secure Enclave security chip

A hacker Thursday afternoon published what he claims to be the decryption key for Apple iOS’ Secure Enclave Processor (SEP)…

9 years ago

An unpatchable flaw in CAN protocol expose modern cars to hack

Experts discovered a flaw in CAN protocol that could be exploited by an attacker to disable safety systems of connected cars, including…

9 years ago

Drupal maintainers fix several access bypass vulnerabilities in Drupal 8

Drupal maintainers this week released security updates to fix several access bypass vulnerabilities in Drupal 8. Update your installation. On Wednesday Drupal maintainers released…

9 years ago

Cyber Criminals Hijack Chrome Extensions and put 4.7 Million Users at Risk

Developer accounts of popular chrome extensions being hijacked by cyber criminals, over 4.7 million users are at a risk of…

9 years ago

NotPetya ransomware caused $300m losses to the shipping giant Maersk

The transportation giant Maersk announced that it would incur hundreds of millions in U.S. dollar losses due to the NotPetya ransomware massive…

9 years ago

After Westminster attack, now Scottish parliament hit by brute-forcing attack

The Scottish Parliament has been targeted by a "brute force" attack, the assault is still ongoing and is similar to…

9 years ago

DitM Dog In The Middle – New Hacking Technique to Eavesdropping

During Defcon 25 hacking conference held in Las Vegas on July, a new eavesdropping attack technique was introduced, it was…

9 years ago

This website uses cookies.