Hacking

Three credit card transactions could reveal your identity

A recent study on the use of metadata to de-anonymize users revealed that three credit card transactions could reveal your…

9 years ago

Hacking sex toys and dolls

The security expert Ken Munro has run a series of penetration tests on sex toys and dolls for children ...…

9 years ago

PHP Applications and WordPress exposed to the Ghost flaw

PHP applications and WordPress CMS might be affected by the GHOST vulnerability that could be exploit to compromise the hosting…

9 years ago

WhatsApp Web client and Mobile App affected by privacy issues

The 17-year-old security researcher Indrajeet Bhuyan discovered two security flaws in the newborn WhatsApp Web client which menace user privacy.…

9 years ago

Critical DNS hijacking flaw affects D-Link DSL router

Critical DNS hijacking flaw affects D-Link DSL router, the flaw affects the ZynOS firmware that is used also by other…

9 years ago

Reading the ENISA Threat Landscape 2014 report

The European Union Agency for Network and Information Security has published the annual report on the cyber threat landscape "ENISA…

9 years ago

A hacker developed Maldrone, the first malware for drones

Security expert Rahul Sasi has discovered and exploited a backdoor in Parrot AR Drones that allows him to remotely hijack…

9 years ago

Lizard Squad claims to have brought down both Facebook and Instagram

Both social network platforms Facebook and Instagram went down on Tuesday while Lizard Squad hacking team claims responsibility for an…

9 years ago

AT&T short codes exposes users to phishing scams

Computer programmer Dani Grant revealed that short codes from AT&T are easy to spoof and expose customers to phishing scams.…

9 years ago

Topface data breach – 20 Million records exposed

Topface, the Russian-based dating site, has been hacked, User names and e-mail addresses of 20 million visitors are offered for…

9 years ago

This website uses cookies.