Hacking

How to chain flaws in Lenovo VIBE smartphones to gain root privileges

Researchers from Mandiant found a way to gain root privileges on Lenovo VIBE smartphones by chaining three vulnerabilities. The Lenovo…

9 years ago

Severe flaws found in German e-Government OSCI 1.2 Communication Library

Security researchers at SEC-Consult found severe vulnerabilities in the German e-government Communication Library OSCI (Online Services Computer Interface). According to the…

9 years ago

Telegram agrees to register in Russia, but it will not share private data

Telegram agrees to register with Russia authorities to avoid the local ban, but the battle is still ongoing because it…

9 years ago

The NotPetya ransomware is a Brick Through Your Windows

The recent global outbreak of the "NotPetya" malware has some very curious features that have left security officials puzzled. Despite…

9 years ago

FBI hacked a US Darknet shopper who tried to purchase Mail Bomb

The FBI hacked the system of a dark web user who tried to purchase a mail bomb from an undercover…

9 years ago

NATO CCD COE attributed the massive NotPetya attack to a ‘state actor’ and call for a joint investigation

NATO attributed the massive NotPetya attack to a 'state actor,' NotPetya and WannaCry Call for a Joint Response from International…

9 years ago

SQL Injection flaw in WordPress Plugin WP Statistics potentially exposed 300,000+ Sites

Security experts at Sucuri have discovered a SQL Injection vulnerability in WP Statistics, one of the most popular Wordpress plugins. Security…

9 years ago

Wikileaks – CIA developed OutlawCountry Malware to hack Linux systems

WikiLeaks released a new batch of documents that detail the CIA tool OutlawCountry used to remotely spy on computers running Linux operating…

9 years ago

Researcher released Eternal Blues, a free EternalBlue vulnerability scanner

The security researcher Elad Erez developed Eternal Blues, a free EternalBlue vulnerability scanner that could be used to assess networks.…

9 years ago

Cisco IOS Software is affected by RCE flaws that could allow full hack of the devices

Experts at CISCO discovered severe remote code execution vulnerabilities in Cisco IOS Software while conducting internal testing. Cisco warned users of…

9 years ago

This website uses cookies.