Hacking

Millions of Xiaomi Smartphone vulnerable to remote hacking

Millions of Xiaomi smartphone are affected by a critical remote code execution flaw that could be exploited by hackers to…

9 years ago

CVE-2016-3238 Windows flaw allows to hack companies via printers

Microsoft has just fixed a the CVE-2016-3238 Print Spooler vulnerability that allows attackers to hack any version of Microsoft Windows.…

9 years ago

Hacker Interviews – Chema Alonso

Enjoy the interview with Chema Alonso (@chemaalonso), Chief Digital Officer at Telefonica, who is one of the most talented cyber…

9 years ago

Experts found a government malware on the Dark Web

Experts have made a disconcerting discovery on the Dark Web, they have found a sophisticated government malware that could be…

9 years ago

Hacker Interviews – John McAfee, the legend

Dear readers, I'm really proud and excited to share with you my interview with a legend Mr John McAfee. John…

9 years ago

Be careful backdoored Pokemon GO Android App spotted in the wild

ProofPoint have found in the wild a backdoored version of the popular Pokemon GO Android App that could allow attackers…

9 years ago

Netia SA, the second telecom company hacked by a Ukrainian hacker

A Ukrainian Hacker has breached the servers of the Polish Telecom Company Netia SA and leaked on an underground forum…

9 years ago

Hacking mobile via hidden voice commands embedded in YouTube videos

A group of researchers has devised a new method for hacking mobile devices by using hidden voice commands in YouTube…

9 years ago

Hacker Interviews – s1ege

Today, thanks to the support of Aveek Sen, I have interviewed the hacker that goes online with the pseudonymous of…

9 years ago

Realstatistics campaign leads to ransomware via compromised sites

Threat actors in the wild are behind the Realstatistics campaign are leveraging on out-of-date CMSs to deliver the CryptXXX ransomware.…

9 years ago

This website uses cookies.