Researchers have successfully carried out a traffic correlation attack against the Tor Network identifying hidden services with 88 percent accuracy. Researchers from the Massachusetts Institute of Technology (MIT) have discovered a vulnerability in Tor which lead the identification of hidden services with up to 88 percent accuracy. The team of experts composed of researchers from […]
A new vulnerability affects Bind, the open-source software that implements the Domain Name System (DNS) protocols for the Internet. BIND is used by servers for translating human-friendly domain names into IP addresses. This vulnerability could be exploited by a lone hacker to bring down swaths of the Internet. The problem affects all the major versions […]
The popular hacker Samy Kamkar has presented a new gadget that could be exploited to hacks GM Cars. The tool allows to locate, Unlock, and Start Them. Do you have a General Motors car? Do you have $100 to spare? Do you want to hack your car? If the reply to my questions is yes, […]
Experts at FireEye discovered a new APT group dubbed APT 29 that is exploiting Twitter to mask the activities of their data-stealer malware. Experts at FireEye uncovered a group of alleged Russian hackers, dubbed APT 29, that is exploiting Twitter to mask the activities of their data-stealer malware. The hackers belonging to the APT 29 […]
A couple of married researchers demonstrated hot to disable high-tech sniper rifles and change their targets with unpredictable consequences. Hacking, hacking, always hacking … this time we will discuss remote hacking of High-tech Sniper Rifles. Hackers can compromise High-tech Sniper Rifles and causing problems pointing to the target. Hackers can gain access to the $13,000 […]
Researchers from Trend Micro discovered a new critical vulnerability in the Android mobile OS that can be exploited to crash mobile devices. Experts from Trend Micro discovered a new vulnerability, an integer overflow bug in the Android mediaserver service, that affects versions of Android starting with 4.3 Jelly Bean and up to 5.1.1 Lollipop. The flaw […]
Accuvant researchers will be releasing an open source piece of hardware dubbed BLEkey that can be used to circumvent these RFID card readers. Do you require to pass a card into a device to enter in your company’s office? Most probably you are using a card based on Radio-Frequency Identification (RFID) technology to grant the […]
United Airlines reportedly hacked by same APT that breached OPM, Anthem. Let’s try to understand why and which are the risks for the US citizens. A Chinese APT group believed to be responsible for a series of high-profile data breaches that affected the U.S. Office of Personnel Management, the Anthem, and more recently the United Airlines. According the media […]
Part of a Pentagon email network taken down over suspicious activity, the US authorities are investigating on the alleged intrusion. New problems for the White House emerges from the cyberspace, a portion of the Department of Defence’s email network has been taken down over suspicious activity. According to Pentagon spokeswoman, the unclassified email network used by […]
Let’s explain what makes the new Bitphone VoIP service, a perfect tool to perform some social engineering calls. Bitphone is a new VoIP service, a perfect tool to perform some social engineering calls, but why? Bitphone is like a Payphone, the only difference is that in this case you need to pay it with bitcoins […]
Security / September 16, 2025