Hacking

Roughly 200,000 Devices still affected by the Heartbleed vulnerability

More than two years after the disclosure of the HeartBleed bug, 200,000 services are still affected. Systems susceptible to Heartbleed…

9 years ago

OurMine crew hacked the New York Times Twitter video account

The New York Times is investigating the hack of its Twitter video account (@nytvideo) that was used to post a…

9 years ago

National Aids Research Institute NARI hacked by the Shad0w Security crew

The hacker @Sc0rp10nGh0s7 from the Shad0w Security group has broken in the server of the National Aids Research Institute NARI…

9 years ago

Lavabit, the Snowden recommended encrypted email service, is back

Lavabit, the Snowden recommended encrypted email service, is back. Its CEO Ladar Levison announced new privacy-enhancing features. Do you remember Lavabit?…

9 years ago

Necurs botnet is back and starts delivering the Locky ransomware

Cisco Security Team has noticed traces of traffic from the dormant Necurs botnet and they are warning of a possible…

9 years ago

Which is the real identity of the Mirai Author Anna-Senpai?

The popular investigator Brian Krebs published the details of his investigation on the identity of the Mirai author Anna-Senpai. In…

9 years ago

2016 Christmas Ukraine power outage was caused by hackers

Ukrenergo confirmed that preliminary results of its investigation showed that the Ukraine power outage that occurred in December was caused…

9 years ago

Crashing iPhone Or iPad with a simple Emoji text message

A simple sequence of three character-long text message containing Emoji can cause the block and the reboot os iPhones and…

9 years ago

US-CERT – Warning, Shadow Brokers Hackers are offering an SMB Zero-Day exploit

The US-CERT has issued a warning after the Shadow Brokers hackers have offered to sell what it claims to be…

9 years ago

The Carbanak gang is with a new modus operandi, Google services as C&C

The infamous Carbanak cybercrime gang is back and is leveraging Google services for command-and-control of its malicious codes. The dreaded…

9 years ago

This website uses cookies.