Hacking

Tesla Motor sent a patch to fix flaws in its connected car

Tesla Motors Inc admitted to have sent an update to patch security vulnerabilities discovered by a couple of cyber security…

10 years ago

Once again alleged Russian hackers hit the Pentagon computers

NBC News reported Russian hackers have compromised computers at the Pentagon, an unclassified email system has been shut down  in…

10 years ago

Funtenna can remotely steal data from air-gapped network using sound waves

A group of researchers has presented at the Black Hat conference Funtenna, a hacking technique to steal data from air-gapped…

10 years ago

ICANN urges passwords reset due an external service provider breach

The ICANN has issued a warning to inform who registered with ICANN.org that their profile accounts were accessed by an…

10 years ago

The Panda Emissary APT specialized in defence aerospace projects

The Panda Emissary group extensively uses long-running strategic web compromises and relies on whitelists to syphon defence aerospace projects from…

10 years ago

Man-in-the-Cloud Attacks rely on common file synchronization services to hack cloud account

Popular cloud storage services such as Google Drive and Dropbox can be abused by hackers running Man-in-the-Cloud (MITC) attacks. The…

10 years ago

CVE-2015-3823 Android bug phones in endless reboots

Trend Micro revealed that Android users are threatened by another vulnerability coded as CVE-2015-3823 which traps mobile phones in endless…

10 years ago

Terracotta VPN, the Chinese VPN Service as Hacking Platform

A Chinese-language Virtual Private Network service provider dubbed Terracotta VPN offers a network of compromised servers as a stealth hacking…

10 years ago

Thunderstrike 2 rootkit infects Mac firmware

A security researcher developed an improved version of the Thunderstrike rootkit that uses Thunderbolt accessories to infect the Mac firmware.…

10 years ago

Interpol is training Police officers to fight crime on the Darknet

Police officers from dozen countries have just completed the first training program on Darknets, Tor hidden services and illegal marketplaces.…

10 years ago

This website uses cookies.