Hacking

Distributed Guessing Attack to hack VISA cards in just six seconds

A group of security researchers discovered a new method dubbed Distributed Guessing Attack to hack VISA credit card in just…

9 years ago

50 Million installations potentially impacted by AirDroid issues

At least 10 million Android users are exposed to cyber attacks due to multiple vulnerabilities affecting the popular AirDroid app.…

9 years ago

FSB accuses foreign hackers of plotting to undermine the Russian banks

According to the FSB unnamed foreign hackers are planning to undermine Russian Banks with cyber attacks and PSYOPS via social…

9 years ago

Kapustkiy hacked a website belonging to the Venezuela Army

The hacker Kapustkiy has breached the Venezuela Army and leaked 3000 user records containing personal information such as names, emails,…

9 years ago

What Happens if you plug a USBKill in a gaming console or a car?

Ill-intentioned could destroy everything using the USBKill device, including gaming console, mobile devices, Google Pixel and also circuits in modern…

9 years ago

A flaw allows to bypass the activation lock on iPhone and iPad

Researchers discovered a bug that can be exploited to bypass Apple’s Activation Lock feature and gain access to the homescreen…

9 years ago

How much money earns cybercriminals? Mostly from $1,000 to $3,000, but …

According to a report published by the threat intelligence firm Recorded Future cybercriminals earn between $1,000 and $3,000 a month.…

9 years ago

More than 1 Million Google accounts hacked by Gooligan Android Malware

Experts from the security firm CheckPoint discovered a new Android malware dubbed Gooligan that has already compromised more than a…

9 years ago

Thousands of UK National Lottery player accounts compromised

Roughly 26,500 accounts of the UK National Lottery players were accessed by cybercriminals, authorities are investigating the case. According to…

9 years ago

The code of a Firefox Zero-Day Exploit used to unmask Tor Users is online

A zero-day exploit in the wild has been used by threat actors to de-anonymize Tor users by executing malicious code…

9 years ago

This website uses cookies.