Hacking

Hacking Baby Monitors is dramatically easy

Security researchers from Rapid7 security firm discovered a number of security vulnerabilities affecting several Video Baby Monitors. Researchers find major…

10 years ago

Once again Chinese smartphones infected with pre-installed malware

Security experts at G-Data security firm have discovered new cases of Chinese Android mobile devices infected by pre-installed malware. Security…

10 years ago

Rocket kitten and Cyber Espionage – Targeting individuals for geopolitical purposes

ClearSky detected new activity from the Rocket kitten APT group against 550 targets, most of which are located in the…

10 years ago

Filet-O-Firewall exposes millions of home routers to attacks

The security vulnerability Filet-O-Firewall in UPnP is exposing millions of home networking devices at risk for cyber attacks. According to…

10 years ago

US weighs sanctioning China and Russia in response to recent cyber attacks

The Obama administration weighs sanctioning China and Russia in response to recent cyber attacks who have exposed sensitive data of…

10 years ago

Tango Down, NCA website offline after Lizard Squad attack

Alleged Lizard Squad hackers have DDoSed the website of the British NCA and have downed it after law enforcement arrested…

10 years ago

Dozens dating websites got breached by Russian hackers

A huge number of individuals are in danger because of massive attacks by Russian hackers, total 97 websites have been broken…

10 years ago

Car Hackers Charlie Miller and Chris Valasek will work at Uber

Charlie Miller and Chris Valasek, the famous car hackers who recently demonstrated that some Fiat Chrysler cars can be remotely…

10 years ago

KeyRaider: iOS Malware targets over 225,000 Apple accounts

PaloAlto and with WeipTech have identified 92 samples of a new iOS malware family in the wild dubbed KeyRaider that…

10 years ago

PowerMemory, how to extract credentials present in files and memory

This post explains how to use the PowerMemory script to reveal the passwords used by users of the computers running…

10 years ago

This website uses cookies.