Hacking

Cisco Security Appliances contain a default SSH Key

Security experts at Cisco revealed the existence of a default SSH key in many security appliances, an attacker can exploit…

9 years ago

ScryptCC hacked, large amount of Bitcoin stolen. DO NOT DEPOSIT!

Altcoin cloud mining hash power online marketplace ScryptCC has been hacked and a large amount of Bitcoin was stolen by…

9 years ago

Google accused, Chromium eavesdropping tool installed on computers without permission

Privacy advocates claim snooping component was activated within Chromium, potentially exposing private conversations. Privacy advocates are accusing Google. Privacy advocates…

9 years ago

Adobe fixed the CVE-2015-3113 that is being exploited in the wild

Adobe has released a security update for the critical Adobe Flash Player vulnerability CVE-2015-3113 that is being actively exploited in…

9 years ago

Microsoft will not patch an IE exploit affecting million 32bit systems

Security expert Dustin Childs publicly disclosed a Microsoft IE exploit that affects only 32-bit IE platforms which are currently used…

9 years ago

Disclosed new information about Tor sites

A security researcher is trying to harvest information about Tor sites that propose illegal products, and in some cases he…

9 years ago

NSA and GCHQ target security firm including Kaspersky

Documents leaked by Edward Snowden show the NSA and the GCHQ efforts to compromise security software companies including Kaspersky Lab.…

9 years ago

Kevin Mitnick explains how to hack fiber optic and steal sensitive data

The popular hacker Kevin Mitnick explains how it is easy to steal data from a network tapping the cable, even…

9 years ago

Hackers targeted the Polish Airline LOT, grounded 1,400 Passengers

A cyber attack against the ground computer systems of the Polish flagship carrier LOT grounded more than 1,400 passengers at…

9 years ago

Security Affairs newsletter Round 14 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

9 years ago

This website uses cookies.