Hacking

A flaw in the Yahoo Email service allowed hackers to access target’s emails

The Finnish security expert Jouko Pynnönen discovered a vulnerability in the Yahoo email service that allowed hackers to read anyone…

9 years ago

Israeli TV broadcast hacked, attackers played Muslim call to prayer

On Tuesday night, a group of unknown hackers took control of the Israeli TV broadcast Channel 2 and played Muslim…

9 years ago

Thieving Magpie allows NSA spies to snoop on in-flight mobile calls

The Thieving Magpie programme allows the NSA and the GCHQ to intercept data from passengers traveling on board commercial aircrafts.…

9 years ago

Employee’s Provident Fund organisation, India website found INSECURE

Security firm’ Eioneus Systems’ claims to have found a serious security flaw in Universal Account Number(UAN) website (India). In a…

9 years ago

CVE-2016-8655 – A new 5-Year-Old flaw found in the Linux Kernel

A security expert discovered a serious five-year-old privilege-escalation vulnerability, tracked as CVE-2016-8655, that affects every Linux distro. In October, the security…

9 years ago

An individual hacked back the San Francisco Muni hacker

In November, an unknown attacker hacked the computer systems of the San Francisco’s Municipal, now an individual hacked back the…

9 years ago

Argentinian Ministry of Industry hacked by Kapustkiy

The young hacker Kapustkiy and his colleague Kasimierz have broken into another website, the Argentinian Ministry of Industry (Ministerio de Produccion). The data…

9 years ago

Dozens of Sony cameras affected by a secret backdoor

Many Sony cameras could be hijacked by hackers and infected with Mirai-like malware due to the presence of a sort…

9 years ago

Adobe Flash Player flaws remain the most used by Exploit Kits

Experts from the firm Recorded Future published a report on the most common vulnerabilities used by threat actors in the…

9 years ago

North Koreans Red Star OS can be easily hacked remotely

The North Korean operating system Red Star OS isn't hacker proof, researchers demonstrated that it can be easily hacked remotely.…

9 years ago

This website uses cookies.