Hacking

US Army bans use of Chinese DJI drones over cyber security concerns

The US Army has ordered its units to stop using Chinese DJI drones because of "cyber vulnerabilities" in the products.…

9 years ago

Microsoft Attempts To Fix Stuxnet For The Third Time

Microsoft released a new security update on June 17th in an attempt to patch a vulnerability which allowed the Stuxnet…

9 years ago

Black Hat 2017 – GitPwnd tool could be used by attackers to communicate with compromised devices via Git repositories

Black Hat 2017 - Security experts develop GitPwnd, a tool that could be used by attackers to communicate with compromised…

9 years ago

Wikileaks – CIA Dumbo tool allows agents to disable security cameras

Wikileaks published a new batch of files belonging to the CIA Vault 7 archive that reveals the 'Dumbo' tool used…

9 years ago

Former Bupa employee offered 1 million customer records for sale on dark web

Former Employee of the Healthcare giant Bupa offered for sale records of 1 Million clients on Dark Web. A former…

9 years ago

ICS-CERT Issues Warning of CAN Bus Vulnerability

The US ICS-CERT issued an alert in response to a public report of a vulnerability in the Controller Area Network…

9 years ago

Roughly 175,000 Chinese Internet Connected security cameras can be easily hacked

An estimated 175,000 Internet of Things (IoT) connected security cameras manufactured by Shenzhen Neo Electronics are vulnerable to cyber attacks.…

9 years ago

Security flaws affect TCUs used in BMW, Ford, Infiniti, and Nissan vehicles

Three security researchers have discovered security vulnerabilities in the telematics control units (TCUs) used in BMW, Ford, Infiniti, and Nissan…

9 years ago

HBO Hacked again, Game of Thrones Script Leaked on the Internet

Hackers claim to have stolen 1.5 terabytes of data from HBO, including information on the current season of Game of…

9 years ago

Hackers leaked data from alleged Mandiant FireEye ‘breach’ under #OpLeakTheAnalyst.

Late Sunday evening, hackers leaked details alleged stolen from a compromised system maintained by Adi Peretz, a Senior Analyst at…

9 years ago

This website uses cookies.