Hacking

76 Popular iOS apps are vulnerable to man-in-the-middle (MITM) attacks

A study conducted on iOS mobile apps revealed that many of them are affected by security vulnerabilities that expose users…

9 years ago

A Hacker hijacked over 150,000 Printers publicly exposed online

A hacker hijacked over 150,000 Printers publicly exposed online to warn owners of cyber attacks. Recently a group of researchers…

9 years ago

Microsoft Windows DRM issue could be exploited to uncloak Tor Browser users

HackerHouse researchers have discovered that media content protected by Digital Rights Management (DRM) can be used to uncloak Windows Tor…

9 years ago

The Slammer worm is back after 13 years to target ancient SQL servers

The SQL Slammer worm, one of the most long-lived malware, now seems to be back online to compromise ancient SQL…

9 years ago

SCADA Honeywell XL Web II Controller exposed password in clear text

The web-based SCADA system Honeywell XL Web II Controller is affected by multiple flaws that can be remotely exploited to…

9 years ago

Anonymous hacked Freedom Hosting II, a fifth of the Dark Web is down

The group of hacktivists Anonymous hacked the popular Freedom Hosting II Dark Web hosting provider, a fifth of the .onion…

9 years ago

Russian APT 29 group launched cyber attacks against Norwegian authorities

The Norwegian intelligence agency PST is one of the targets of spear phishing attacks launched by the Russian APT 29…

9 years ago

US-CERT is warning about a Windows SMB zero-day flaw

The US-CERT issued a security advisory to warn of a zero-day memory corruption vulnerability in the SMB (Server Message Block) protocol that…

9 years ago

Chinese state-sponsored hackers targets Russia and Belarus with ZeroT and PlugX

According to the firm ProofPoint, Chinese state-sponsored actors continues to spy on military and aerospace organizations in Russia and Belarus.…

9 years ago

Authentication Bypass Vulnerability found in Cisco Prime Home product

The experts at Cisco have discovered a critical authentication bypass vulnerability in the Cisco Prime Home during an internal security…

9 years ago

This website uses cookies.