Hacking

New Apple Gatekeeper bypass can allow running rouge applications

Patrick Wardle, director of research at Synack has already demonstrated another method, called Apple dylib hijacking, to bypass Apple GateKeeper.…

10 years ago

WinRAR zero-day open million users to hack

The security researcher Mohammad Reza Espargham a new zero-day flaw is threatening million of users of the latest version of WinRAR.…

10 years ago

US Air Force Wireless hacking in Flight

The US Air Force is using a modified  EC-130 Compass Call aircraft to demonstrate how to hack into enemy networks.…

10 years ago

The Hacking crew known as Gaza cybergang was very active in Q2 2015

Security experts at Kaspersky have observed an increase in the activity of the group of hackers politically motivated known as…

10 years ago

Does Mr. Robot’s use real Hacking Tools? Which are?

Check out the hacking tools used by Mr. Robot and see why the display of these tools is as realistic…

10 years ago

Linux XOR DDoS Botnet delivers potent DDoS attacks

Experts at Akamai discovered the Linux XOR DDoS Botnet,  a malicious infrastructure used to run potent DDoS attacks against dozens…

10 years ago

The Shopify commerce platform is open to RFD attacks

The researcher David Sopas at WebSegura discovered a Reflected Filename Download vulnerability in the popularmulti-channel commerce platform Shopify. Shopify is a…

10 years ago

Mobile Ad Network exploited to run a major DDoS Attack

Security experts at CloudFlare observed a major DDoS attack against one of their customers that appeared to leverage a mobile…

10 years ago

How to use GCAT backdoor with Gmail as a C&C server

The GCAT backdoor is a fully featured backdoor which could be controlled by using Gmail as a Command & Control…

10 years ago

Tracking Hacker Forums with Traffic Analysis

A study conducted by the Intelligence firm RecordedFuture demonstrates the efficiency of the analysis of hacker forums through traffic analysis-like…

10 years ago

This website uses cookies.