Hacking

US contractor stole an astonishing quantity of data, including Equation Group tools

The US DoJ has charged the US contractor Harold Thomas Martin with theft of secret documents and highly classified government…

9 years ago

Cyber Criminal can easily get access to your YesBank Internet Banking using stolen Debit/Credit Card Number and PIN

A security researcher disclosed a vulnerability in the online banking service of the YesBank that promptly fixed the issue. I am…

9 years ago

The new Dirty COW Linux Kernel Exploit already used in attacks in the wild

Experts disclosed a new Linux kernel vulnerability dubbed Dirty COW that could be exploited by an unprivileged local attacker to…

9 years ago

FruityArmor APT exploited Windows Zero-Day flaws in attacks in the wild

Experts from Kaspersky have discovered a new APT dubbed FruityArmor APT using a zero-day vulnerability patched this month by Microsoft.…

9 years ago

Experts devised a method to capture keystrokes during Skype calls

A group of security experts discovered that the Microsoft Skype Messaging service exposes user keystrokes during a conversation. A group…

9 years ago

Flaw in Intel CPUs could allow to bypass ASLR defense

A flaw in Intel chips could be exploited to launch “Side channel” attack allowing attackers bypass protection mechanism known as…

9 years ago

Czech police arrested a Russian hacker alleged involved in 2012 LinkedIn hack

Czech police, working with the FBI, has arrested a Russian man at a hotel in Prague that is suspected to…

9 years ago

SQL Injection zero-day in component ja-k2-filter-and-search of Joomla

Information Security experts have discovered an SQL injection zero-day vulnerability in Joomla component ja-k2-filter-and-search. Information Security Researchers Dimitrios Roussis and…

9 years ago

Ops also the Trump Organization uses insecure e-mail servers

According to a security researcher, the Trump Organization's mail servers run on an outdated version of Microsoft Windows Server. Hillary…

9 years ago

Magento card-swiping malware hides stolen card data in legitimate images

Security experts have spotted an interesting exfiltration technique adopted by crooks to exfiltrate card data from Magento platforms. Security experts…

9 years ago

This website uses cookies.