A team of researchers has found a couple of critical flaws in PHP and exploited them to hack PornHub, on…
Enjoy my interview with the Zilla from GhostSquadHackers, I believe it is essential for cyber security experts to know how…
The Indian security expert and bug hunter Avinash has accessed and downloaded the entire Vine source code and it was…
Let's continue the series of interviews with talented hackers some of them like NeckrosTheTerrible are involved in anti-ISIS campaigns. NeckrosTheTerrible is a…
According to the US-based Akamai Technologies Distributed Denial Of Service (DDoS) attacks have a great level of sophistication today. The Morris…
A group of hackers has devised a method to hack Pokemon Go to and reveal the exact location of characters all around you.…
The security expert Brian Krebs investigated the links between the Carbanak cybercrime gang and the Infocube security firm. Today I…
Let's continue the series of interviews with talented hackers some of them like Scrub are involved in anti-ISIS campaigns. Scrub is a…
In military jargon, the term Red Team is traditionally used to identify highly skilled and organized groups acting as fictitious…
The NSA whistleblower Edward Snowden and the popular hacker Andrew “Bunnie” Huang designed Introspection Engine, an interesting anti-surveillance device. While…
This website uses cookies.