Hacking

Number of WordPress Attacks powered by compromised routers is rapidly dropping

Experts from security firm WordFence reported a rapid reduction of WordPress attacks originating from hundreds of ISPs worldwide. Experts at…

9 years ago

A critical RCE flaw in Intel Management Engine affects Intel enterprise PCs dates back 9 years

A critical remote code execution vulnerability tracked as CVE-2017-5689 in Intel Management Engine affects Intel enterprise PCs dates back 9…

9 years ago

Kaspersky Lab APT Trends report, Q1 2017 – From Lazarus APT to StoneDrill

Kaspersky is currently monitoring the activities of more than 100 threat actors, from the From Lazarus APT to StoneDrill. According…

9 years ago

Ourmine hackers breached into the Unity Forum

Ourmine hackers breached into the Unity Forum and informed its users that they had gained access to a database containing…

9 years ago

Yahoo awarded $7,000 a bug hunter for Flickr account hijacking vulnerability

Yahoo awarded $7,000 to the bug hunter Michael Reizelman, aka mishre, for Flickr account hijacking vulnerability. Reizelman was a popular bug hunter…

9 years ago

Graph theory applied to a portion of the Dark Web shows it a set of largely isolated dark silos

A group of researchers conducted a study on the Dark Web leveraging the Graph theory. This hidden space appears as…

9 years ago

WHID Injector: How to Bring HID Attacks to the Next Level

Luca Bongiorni was working on a cheap and dedicated hardware that he could remotely control (i.e. over WiFi or BLE),…

9 years ago

Lenovo warns of IBM Storwize shipped with infected initialization USB drives

Some USB flash drives containing the initialization tool shipped with the IBM Storwize for Lenovo contain a malicious file. Some…

9 years ago

Hacker holds Netflix to ransom over new episodes of Orange Is The New Black

The hacker 'The Dark Overlord' claims to have stolen and leaked online episodes from the forthcoming season of the TV…

9 years ago

Poorly designed apps leave millions of phones at risk of open port attack

Security experts demonstrated that insecure mobile applications leave millions of smartphones at risk of open port attack. A group of…

9 years ago

This website uses cookies.