Hacking

DDoSCoin, the cryptocurrency that pays the participation in DDoS attacks

Two researchers have devised a cryptocurrency scheme dubbed DDoSCoin that pays everytime a user participates in a DDoS attack against…

9 years ago

DEF CON 2016 – Bluetooth-based smart locks easy to hack

Security Researchers demonstrated at the Def Con hacker conference how it is easy to open some Bluetooth-based smart locks. Last…

9 years ago

Guccifer 2.0 leaks personal data of nearly 200 Congressional Democrats

Guccifer 2.0, the alleged hacker behind the DNC hack released another trove of documents about House Democrats, including Nancy Pelosi's…

9 years ago

DiskFiltration Stealing data from air-gapped networks via acoustic signals

A group of experts devised a technique dubbed DiskFiltration to exfiltrate data from air-gapped networks relying on acoustic signals emitted…

9 years ago

Are voting machines easy to hack? Yes, because they are outdated

Is it possible to hack voting machines? According to cyber security experts, it is possible due to the use of…

9 years ago

How to open 100 Million Volkswagen cars with a cheap wireless device

A new hack leveraging on two distinct vulnerabilities could be exploited to open every Volkswagen vehicles that have been sold…

9 years ago

Patch your vBulletin forum asap to avoid being hacked

vBulletin forums need to be patched asap to avoid attackers to scan servers hosting the CMS and remotely execute arbitrary…

9 years ago

Hacker Interviews – RootPhantom from Phantom Squad

Today I have interviewed RootPhantom, another member of the popular hacker crew Phantom Squad. Enjoy the interview!   You are…

9 years ago

Serious Linux design flaw CVE-2016-569 allows Traffic Hijacking

A severe design flaw in the Linux kernel could be exploited by attackers to hijack traffic, inject malware into connections,…

9 years ago

Backdoor keys allow attackers to the bypass UEFI Secure Boot

Once again Microsoft failed in fixing a severe Secure Boot vulnerability that can be exploited to install rootkits on Windows…

9 years ago

This website uses cookies.