Hacking

Windows zero-day offered for sale in a crime forum for $90,000Windows zero-day offered for sale in a crime forum for $90,000

Windows zero-day offered for sale in a crime forum for $90,000

The researchers from the Trustwave's Spiderlabs team discovered that a Windows zero-day is available for sale in a popular crime…

9 years ago
Power plant ICS threatened by an easy remotely exploitable flawPower plant ICS threatened by an easy remotely exploitable flaw

Power plant ICS threatened by an easy remotely exploitable flaw

The independent researcher Maxim Rupp reported an unpatchable flaw in the ICS Environmental Systems Corporation (ESC) 8832 Data Controller. Vulnerable…

9 years ago
Android 6.0 Marshmallow permission-granting model is under attackAndroid 6.0 Marshmallow permission-granting model is under attack

Android 6.0 Marshmallow permission-granting model is under attack

Malware researchers are warning Android's latest permission-granting model in version 6.0 Marshmallow is now been targeted by Mobile malware authors.…

9 years ago
US-CERT warns MEDHOST medical app contains hard-coded credentialsUS-CERT warns MEDHOST medical app contains hard-coded credentials

US-CERT warns MEDHOST medical app contains hard-coded credentials

The US Computer Emergency Response Team has issued a warning after the discovery a security issue the popular medical application…

9 years ago
Hacker Interviews – Speaking with Mikko HypponenHacker Interviews – Speaking with Mikko Hypponen

Hacker Interviews – Speaking with Mikko Hypponen

Mikko Hypponen does not need any introduction, he is a true star, one of those professionals who have indelibly marked…

9 years ago
Why surveillance firm Blue Coat was granted a powerful encryption certificate?Why surveillance firm Blue Coat was granted a powerful encryption certificate?

Why surveillance firm Blue Coat was granted a powerful encryption certificate?

Experts discovered that the Controversial Surveillance firm Blue Coat was granted a powerful encryption certificate that can be used for…

9 years ago
Hacking NTP Servers from Long-Distance with low cost devicesHacking NTP Servers from Long-Distance with low cost devices

Hacking NTP Servers from Long-Distance with low cost devices

A couple of experts demonstrated how to wirelessly change the time on NTP servers over long distances using an inexpensive…

9 years ago
Hacker Interviews – Claudio Nex GuarnieriHacker Interviews – Claudio Nex Guarnieri

Hacker Interviews – Claudio Nex Guarnieri

Hacker interview - Today I have the honor to interview Claudio Guarnieri, aka Nex, one of the most talented hackers…

9 years ago
A fourth bank hit by SWIFT hackers, are they backed by the DPRKA fourth bank hit by SWIFT hackers, are they backed by the DPRK

A fourth bank hit by SWIFT hackers, are they backed by the DPRK

A fourth Bank in Philippines was a victim of the SWIFT hackers and experts at Symantec confirmed the malware shares code…

9 years ago
Hacker Interviews – Sneaker (GhostSec)Hacker Interviews – Sneaker (GhostSec)

Hacker Interviews – Sneaker (GhostSec)

Today I propose you an interview with Sneaker, one of the members of the GhostSec crew. The Sneaker is a very…

9 years ago