Hacking

The North American cyber-criminal underground it’s easy to access!

According to a new report published by Trend Micro, the North American cyber criminal underground is very easy to access.…

10 years ago

Hashcat, the fastest Password Cracking utility is now Open Source

Hashcat, the popular password recovery tool has been released as open source under the MIT license. You can contribute to it.…

10 years ago

Linksys wireless routers are open to cyber attacks

According to an advisory published by the KoreLogic firm the Linksys EA6100-6300 wireless routers are vulnerable to attacks due to…

10 years ago

Critical vulnerabilities found in Honeywell Midas Gas Detectors

Another vulnerable IoT device is in the headlines, this time two serious vulnerabilities affect the Honeywell Midas gas detectors. Honeywell…

10 years ago

3 OEMs Vulnerable To 3 Vulnerabilities. Your PCs At Risk

Bad news for PC users, Lenovo machines can be hijacked by visiting a malicious website, meanwhile Dell and Toshiba PC…

10 years ago

RCMP Cybercrime Strategy to fight online crimes

The RCMP Cybercrime Strategy aims to improve Canada's national police force in its fight against the rising and evolving threat…

10 years ago

Millions of smart devices at risk from 3-year-old flaw

According to Trend Micro up to 6.1 million smart devices, including this smart TV and routers haven't patched a software…

10 years ago

3G/4G modems continue to be vulnerable

Researchers have conducted a series of tests on popular 3G/4G mobile modems (data dongles) and routers discovered an impressive number…

10 years ago

Black marketplace – 50c buys login for stolen media accounts

It is Christmas time and sellers are offering a wide number of products and services in the Black marketplace. 50c buys…

10 years ago

Adobe Animate CC replaces Adobe Flash, what about security?

Adobe announced that it is dismissing Adobe Flash Professional CC to introduce a new product, the Adobe Animate CC. It…

10 years ago

This website uses cookies.