Hacking

Network Time Protocol flaws can cause chaos on a global scale

Serious flaws in the Network Time Protocol can be exploited to cause severe outages, eavesdrop encrypted communications, bypass authentication processes.…

10 years ago

Businesses Using Millions of insecure SHA-1 Certificates

Experts at Netcraft discovered that nearly a million SSL SHA-1 certificates were signed with the potentially vulnerable SHA-1 hashing algorithm.…

10 years ago

Western Digital self-encrypting hard drives are not secure

A trio of researchers has demonstrated that some versions of self-encrypting hard drives manufactured by the Western Digital are affected…

10 years ago

Crooks stole €600,000 in MitM attacks on EMV Cards

A group of French researchers discovered how Fraudsters Stole nearly $680,000 Via MitM Attack on EMV Cards. On October 1st,…

10 years ago

Thousands of Magento websites compromised to serve malware

Security experts have discovered that thousands of websites running the eBay’s Magento e-commerce platform have been compromised and used to…

10 years ago

A young hacker violated the CIA Director’s private AOL email

A young hacker violated the CIA Director's personal email account and leaked sensitive files including a top-secret application for a…

10 years ago

Facebook. Beware state-sponsored hackers are trying to hack you!

Good news, starting today, Facebook will notify you if they believe state-sponsored hackers are trying to compromise your account. Facebook…

10 years ago

Beware, connected ikettles can leak WiFi passwords

The Pen Test Partners researcher Ken Munro mapped and hacked connected iKettles across London demonstrating they leak WiFi passwords. The…

10 years ago

WiFi jamming, too easy and cheap to run attacks

A security analyst has demonstrated that WiFi Jamming, such as the Jamming of Bluetooth and Zigbee systems, is very easy…

10 years ago

How to extract PIN from any selfie, is biometrics secure?

The German researcher Starbug, has demonstrated that it is possible to extract everyone’s smartphone PIN code from any selfie “image,”…

10 years ago

This website uses cookies.