Two researchers have devised a cryptocurrency scheme dubbed DDoSCoin that pays everytime a user participates in a DDoS attack against…
Security Researchers demonstrated at the Def Con hacker conference how it is easy to open some Bluetooth-based smart locks. Last…
Guccifer 2.0, the alleged hacker behind the DNC hack released another trove of documents about House Democrats, including Nancy Pelosi's…
A group of experts devised a technique dubbed DiskFiltration to exfiltrate data from air-gapped networks relying on acoustic signals emitted…
Is it possible to hack voting machines? According to cyber security experts, it is possible due to the use of…
A new hack leveraging on two distinct vulnerabilities could be exploited to open every Volkswagen vehicles that have been sold…
vBulletin forums need to be patched asap to avoid attackers to scan servers hosting the CMS and remotely execute arbitrary…
Today I have interviewed RootPhantom, another member of the popular hacker crew Phantom Squad. Enjoy the interview! You are…
A severe design flaw in the Linux kernel could be exploited by attackers to hijack traffic, inject malware into connections,…
Once again Microsoft failed in fixing a severe Secure Boot vulnerability that can be exploited to install rootkits on Windows…
This website uses cookies.