Hacking

Crooks hijack Magento Realex Payments extension to steal payment card data

Cybercriminals hijack Magento Realex Payments extension to steal payment card data. Experts at Sucuri are observing massive attacks. Cybercriminals continue to…

9 years ago

The CVE-2017-5638 Apache Struts 2 command execution flaw affects Cisco products

On Friday, Cisco confirmed that at least some of its products are affected by an Apache Struts 2 command execution…

9 years ago

CHIPSEC, Intel Security releases detection tool also for CIA EFI rootkits

After CIA leak, Intel Security releases CHIPSEC, a detection tool for EFI rootkits that detect rogue binaries inside the computer…

9 years ago

Danish-speaking users hit by malware spread via Dropbox links

Danish-speaking users were infected by malware spread through Dropbox, but the company quickly adopted the countermeasures to stop the attack.…

9 years ago

640,000 stolen PlayStation accounts being sold on the Dark Web

The seller that goes online with moniker SunTzu583 is offering 640,000 PlayStation accounts for USD 35.71 (0.0292 BTC), it source…

9 years ago

Researchers discovered severe flaws in the Confide which is also used by White House staffers

Confide App, the secure messaging app used by staffers in the White House and on Capitol Hill is not as…

9 years ago

Do you want your own IoT botnet? 185,000+ Wi-Fi-connected cameras are open to hack

The researcher Pierre Kim revealed that more than 185,000 vulnerable Wi-Fi-connected cameras are exposed to the Internet, ready to be…

9 years ago

Patch Apache Struts 2 Now! Hackers are exploiting a remote code execution zero-day in the wild

Researchers have spotted a remote code execution zero-day in Apache Struts 2, the flaw has being exploiting by that threat…

9 years ago

Wikileaks Vault7: CIA Umbrage team, the factory of false flag ops

Wikileaks Vault7 data leak -  the Umbrage team was tasked by the Central Intelligence Agency for false flag hacking operations.…

9 years ago

How to Browse The Internet Securely And Anonymously

These are some of the top methods you can use to browse the internet securely and anonymously. Even as the…

9 years ago

This website uses cookies.