Hacking

Researchers exploited PHP Zero-Days to Hack PornHub

A team of researchers has found a couple of critical flaws in PHP and exploited them to hack PornHub, on…

9 years ago

Hacker Interviews – Zilla from GhostSquadHackers

Enjoy my interview with the Zilla from GhostSquadHackers, I believe it is essential for cyber security experts to know how…

9 years ago

Bug hunter downloaded the entire Vine source code

The Indian security expert and bug hunter Avinash has accessed and downloaded the entire Vine source code and it was…

9 years ago

Hacker Interviews – NeckrosTheTerrible

Let's continue the series of interviews with talented hackers some of them like NeckrosTheTerrible are involved in anti-ISIS campaigns. NeckrosTheTerrible is a…

9 years ago

Akamai Threat Advisory – Evolution of DDoS attacks

According to the US-based Akamai Technologies Distributed Denial Of Service (DDoS) attacks have a great level of sophistication today. The Morris…

9 years ago

Hacking Pokemon Go to reveal characters all around you

A group of hackers has devised a method to hack Pokemon Go to and reveal the exact location of characters all around you.…

9 years ago

Is the Infocube firm tied to the Carbanak cybercrime gang?

The security expert Brian Krebs investigated the links between the Carbanak cybercrime gang and the Infocube security firm. Today I…

9 years ago

Hacker Interviews – Scrub

Let's continue the series of interviews with talented hackers some of them like Scrub are involved in anti-ISIS campaigns. Scrub is a…

9 years ago

Cyber Security: Red Team, Blue Team and Purple Team

In military jargon, the term Red Team is traditionally used to identify highly skilled and organized groups acting as fictitious…

9 years ago

Snowden and Bunnies devised the Introspection Engine to avoid surveillance

The NSA whistleblower Edward Snowden and the popular hacker Andrew “Bunnie” Huang designed Introspection Engine, an interesting anti-surveillance device. While…

9 years ago

This website uses cookies.