Hacking

Is there electronic warfare behind the block of Swedish air traffic control systems?Is there electronic warfare behind the block of Swedish air traffic control systems?

Is there electronic warfare behind the block of Swedish air traffic control systems?

Swedish experts warned of an electronic warfare attack on its air traffic control systems occurred in November. Is it electronic…

9 years ago
Apple iMessage flaw exposed chat history and more with a single clickApple iMessage flaw exposed chat history and more with a single click

Apple iMessage flaw exposed chat history and more with a single click

A group of security researchers has found a security flaw in the Apple iMessage that exposed chat history and sensitive…

9 years ago
How to restore files encrypted by the Petya ransomware in less than 7 secondsHow to restore files encrypted by the Petya ransomware in less than 7 seconds

How to restore files encrypted by the Petya ransomware in less than 7 seconds

Security Researchers have developed a decryption tool to restore the files encrypted by the Petya ransomware with a key generated…

9 years ago
British youngster pleading guilty to booter and malware salesBritish youngster pleading guilty to booter and malware sales

British youngster pleading guilty to booter and malware sales

Teenage hacker developed a dangerous booter that was offered for sale, it was used to crash 224,000 websites around the…

9 years ago
Bug Bounty Program is becoming more popular in JapanBug Bounty Program is becoming more popular in Japan

Bug Bounty Program is becoming more popular in Japan

Sprout, the cybersecurity firm in Japan has launched BugBounty.jp, which is the first bug bounty program in Japan designed to…

9 years ago
Researchers devised a reCaptcha breaking system effective against Google and FacebookResearchers devised a reCaptcha breaking system effective against Google and Facebook

Researchers devised a reCaptcha breaking system effective against Google and Facebook

A group of boffins discovered vulnerabilities in the reCaptcha systems of Google and Facebook and devised an attack method. The…

9 years ago
Be careful products sold on Amazon are infected with malwareBe careful products sold on Amazon are infected with malware

Be careful products sold on Amazon are infected with malware

Beware, even things on Amazon come with embedded malware… this is the disconcerting discovery made by the expert Mark Olsen.…

9 years ago
Cyber Justice Team claims a massive Data Leak from the Syrian GovCyber Justice Team claims a massive Data Leak from the Syrian Gov

Cyber Justice Team claims a massive Data Leak from the Syrian Gov

The Cyber Justice Team claims a massive Data Leak from the Syrian Government, more than 43 GB of Data available Online…

9 years ago

FBI reveals BEC attacks pilfered $2.3bn from US companies

According to a report recently issued by the FBI, cyber criminals have pilfered more than $2.3bn from 17,642 victims since…

9 years ago
More than 135 million ARRIS cable modems vulnerable to remote attacksMore than 135 million ARRIS cable modems vulnerable to remote attacks

More than 135 million ARRIS cable modems vulnerable to remote attacks

Attackers can exploit the flaws in the ARRIS SURFboard cable modems to remotely knock out the device, more than 135…

9 years ago