Hacking

Over 45 Million passwords from Verticalscope 1,000 sites leaked online

In February Verticalscope platform was hacked and more than 45 Million passwords from  1,000 websites running on it have been…

9 years ago

CVE-2016-4171 – Another Flash Zero-Day exploited in targeted attacks

Adobe states that the Flash Player zero-day vulnerability (CVE-2016-4171) has been exploited in targeted attacks. It will be fixed later…

9 years ago

Hack the Pentagon, hackers already found more than 100 flaws

Hackers contracted by the DoD under the Hack the Pentagon initiative have found more than 100 vulnerabilities exceeding Government's expectations.…

9 years ago

Crooks can clone payments cards with a hi-tech contactless device

Cyber criminals are offering for sale a hi-tech gadget named Contactless Infusion X5t to scan nearby contactless payment cards and…

9 years ago

Hackers find a way to send massive messages on Telegram

Security researchers have found a vulnerability that could allow attackers to send massive messages on Telegram bypassing its limitations. Security…

9 years ago

‘Hacking Team’ and heterogony of ends: how the hack of Phineas Fisher can lead to unwanted worst consequences for the evolution of the Surveillance Tools and State Spyware.

The “heterogony of end” is a famous expression formulated in 1886 by the German philosopher Wihelm Wundt, what about the…

9 years ago

Exclusive: Critical vulnerability found on Twitter?

The newfound critical vulnerability on Twitter seems to allow remote code execution! Which is the reason behind the recent Twitter…

9 years ago

The NSA wants to exploit IoT devices for surveillance and sabotage

The NSA and other intelligence agencies are spending a significant effort in research for hacking IoT devices for both surveillance…

9 years ago

WauchulaGhost targets ISIS Twitter Accounts and floods them with porn images

WauchulaGhost Hacker groups linked to Anonymous hijack ISIS supporters' Twitter accounts and flood their profiles with PORN picture and irreverent…

9 years ago

How to bypass two-factor authentication with a text message

Is Two-factor authentication the solution for any kind of hacks? A text message could be used to take over your…

9 years ago

This website uses cookies.