Hacking

Hacking connected lightbulbs to breach Air-Gapped networksHacking connected lightbulbs to breach Air-Gapped networks

Hacking connected lightbulbs to breach Air-Gapped networks

Two of security researchers have shown how hackers can target connected lightbulbs to exfiltrate sensitive data from Air-Gapped networks. Two…

9 years ago
The website of the Hungarian Government temporarily shut by cyberattackThe website of the Hungarian Government temporarily shut by cyberattack

The website of the Hungarian Government temporarily shut by cyberattack

Officials confirmed that the Hungarian government website came under attack from outside the country. The access to many websites was…

9 years ago
Remotely unlock doors exploiting a flaw in HID Door ControllersRemotely unlock doors exploiting a flaw in HID Door Controllers

Remotely unlock doors exploiting a flaw in HID Door Controllers

Experts from Trend Micro have discovered a serious flaw in HID door controllers that could be remotely exploited by hackers…

9 years ago
Could hackers have hacked election to make Peña Nieto President?Could hackers have hacked election to make Peña Nieto President?

Could hackers have hacked election to make Peña Nieto President?

A Columbian hacker claims he helped the candidate Enrique Peña Nieto in winning the Mexican presidential election in 2012. Until…

9 years ago
The dangerous interaction between Russian and Brazilian cyber criminal undergroundThe dangerous interaction between Russian and Brazilian cyber criminal underground

The dangerous interaction between Russian and Brazilian cyber criminal underground

Kaspersky has analyzed the interaction between the Russian and Brazilian criminal underground communities revealing a dangerous interaction. In the past weeks,…

9 years ago
How to hack drones with just a $40 hardware from 2 km awayHow to hack drones with just a $40 hardware from 2 km away

How to hack drones with just a $40 hardware from 2 km away

The IBM expert Nils Rodday revealed how to hack drones with just a $40 hardware from 2 km away by…

9 years ago
SideStepper method allows to infect iOS devices via MDM SolutionsSideStepper method allows to infect iOS devices via MDM Solutions

SideStepper method allows to infect iOS devices via MDM Solutions

SideStepper is a method to install malicious apps on iOS devices by abusing the mobile device management (MDM) solutions. Security researchers…

9 years ago
The code to bypass Apple System Integrity Protection security mechanism fits in a TweetThe code to bypass Apple System Integrity Protection security mechanism fits in a Tweet

The code to bypass Apple System Integrity Protection security mechanism fits in a Tweet

Apple failed in fixing the System Integrity Protection security mechanism and the exploits code released by a researcher fits in a…

9 years ago
Marine Corps Cyberspace Warfare Group, the new hacker unitMarine Corps Cyberspace Warfare Group, the new hacker unit

Marine Corps Cyberspace Warfare Group, the new hacker unit

The United States Marine Corps has launched on March 25th a new hacker support unit named Marine Corps Cyberspace Warfare…

9 years ago
PayPal flaw allowed hackers to send malicious emailsPayPal flaw allowed hackers to send malicious emails

PayPal flaw allowed hackers to send malicious emails

PayPal has just fixed a security vulnerability that could have been exploited to send malicious emails to users via its…

9 years ago