Hacking

A string could be used to crash Google Chrome

It seems incredible, but as already happened for Skype it is possible to crash the latest version of Google Chrome…

10 years ago

Discovered a Reflected Filename Download flaw in LinkedIn

The Security researcher David Sopas at WebSegura discovered a Reflected Filename Download vulnerability in the popular professional social network LinkedIn. He…

10 years ago

D-Link firmware accidentally includes Code Signing Keys

The Taiwanese networking equipment manufacturer D-Link has accidentally published its private code signing keys in the source of one of…

10 years ago

w0rm hackers hacked another hacking crew

The popular group of hackers dubbed w0rm breached the hacking forum "Monopoly" offering for sale all data present in its…

10 years ago

Bugzilla CVE-2015-4499 flaw, be aware hackers could know all your bugs

A Critical vulnerability affects Mozilla Bugzilla bug-tracking software could be exploited to access details of non-public vulnerabilities stored in its database. The…

10 years ago

The Differences between Targeted Attacks and Advanced Persistent Threats

Although Advanced Persistent Threats and Targeted Attacks are often confused, in their core these are two different things in the field…

10 years ago

A dangerous silent AirDrop attack is threatening Apple users

A new evil vulnerability affecting the AirDrop service could be exploited by attackers to silently infect iPhones and Apple Macs.…

10 years ago

Unlock Android 5.x devices is very easy

The security researcher John Gordon has found an easy way to unlock smartphones running Android 5.0 and 5.1 (Build LMY48M).…

10 years ago

SYNful_Knock malicious ROMMON images discovered in the wild

Mandiant firm has spotted more than a dozen Cisco routers running malicious ROMMON firmware images that allow attackers to control…

10 years ago

FBI warns customers, get Internet of Things away from the Internet

A recent announcement issued by the Federal Bureau of Investigation warns customers that Internet of Things poses opportunities for cyber…

10 years ago

This website uses cookies.