Hacking

Ukraine blames Russia of cyber attacks against the Boryspil airport

Ukrainian Government is accusing Russia of organizing hacker attacks against the Boryspil airport's networks. Cyber security experts of the State…

10 years ago

LastPass phishing attack could allow attackers to steal your passwords

At the recent ShmooCon conference a researcher presented a LastPass phishing attack that could allow hackers to steal your password.…

10 years ago

Critical OpenSSH bug leaks private crypto keys just fixed

It has been fixed the OpenSSH vulnerability that can be exploited to steal crypto keys from vulnerable clients. Recently a…

10 years ago

The Apple Gatekeeper bypassed once again by a researcher

Once again, the security expert Patrick Wardle has demonstrated how to bypass the Apple Gatekeeper security feature. Once again, a security…

10 years ago

Hackers show how reuse barcodes to be able to get fuel discounts

Two New Zealand researchers demonstrated at last Kiwicon conference how to print their own non-expiring 40c vouchers for fuel discounts. Bar codes…

10 years ago

Silverlight exploit discovered by analyzing Hacking Team leaked emails

Microsoft patched a Silverlight zero-day discovered by analyzing internal emails stolen to Hacking Team about Silverlight exploit. Microsoft recently fixed…

10 years ago

How to convert 30$ D-Link DCS web cameras into a backdoor

A group of researchers from Vectra Threat Labs explained how to exploit IoT devices like 30$ D-Link DCS web cameras…

10 years ago

SSH backdoor discovered in Fortinet FortiOS firewalls

Another SSH backdoor? Researchers have discovered highly suspicious code in the Fortinet FortiOS firewalls that were shipped with hardcoded logins. After Juniper,…

10 years ago

Shocking, Teen hacker Cracka owned head of US intelligence James Clapper

Head of US intelligence James Clapper owned by the same hacker who broke into CIA director Brennan’s personal email account.…

10 years ago

A research team has found two flaws in the OAuth 2.0 protocol

According to a group of researchers from the University of Trier two critical flaw affects the oAuth 2.0 authentication protocol.…

10 years ago

This website uses cookies.