Hacking

Hacker found a way to hack Facebook by exploiting the ImageMagick flaw

The bug hunter Andrew Leonov has described how to exploit an ImageMagick flaw to remotely execute code on a Facebook…

9 years ago

Thai TrueOnline ZyXEL and Billion routers still unpatched since July

The security researcher Pedro Ribeiro disclosed several vulnerabilities in the ZyXEL customized routers that could be easily exploited by hackers.…

9 years ago

Watch out, hackers can listen to your Facebook Messenger Chats

A security expert discovered a flaw in the Facebook Messenger audio clip recording feature that could be exploited to listen…

9 years ago

Russian Channel One alleged hacked and BBC Sherlock Final Leaked

On Monday, Russian State Television Channel One leaked online the BBC Sherlock Final episode, the broadcaster blames hackers. On Monday,…

9 years ago

Hackers demonstrate how to hack Samsung SmartCam

Researchers Exploitee.rs discovered a flaw in Samsung SmartCam IP cameras that could be exploited to execute commands and hijack vulnerable…

9 years ago

Insidious phishing attack leverages on fake attachments to steal Gmail credentials

Cybercriminals are adopting specially crafted URLs to trick users into entering their Gmail credentials in a new sophisticated phishing campaign.…

9 years ago

Talos Team discovered serious issues in Aerospike Database Server

Security experts from Cisco Talos discovered several flaws in the Aerospike Database Server, a high-performance, and open source NoSQL database.…

9 years ago

Ploutus-D, a new variant of Ploutus ATM malware spotted in the wild

Security experts from FireEye have spotted a new variant of the infamous Ploutus ATM malware that infected systems in Latin America.…

9 years ago

Hackers that hit MongoDB installs now switch on exposed Elasticsearch clusters

The hackers that targeted MongoDB installations with ransom attacks now switch on the exposed Elasticsearch clusters with a similar tactic.…

9 years ago

WhatsApp backdoor? What is wrong in the last claims?

A security issue can be used to intercept and read encrypted messages. Is this a WhatsApp backdoor? Which are potential…

9 years ago

This website uses cookies.