Hacking

Report: How Iranian hackers attempt to takeover your Gmail

According to a report published by the Citizen Lab Iranian hackers have elaborated a sophisticated phishing scheme to takeover Gmail…

10 years ago

How Hackers Could takeover Facebook business pages

The Indian security expert Laxman Muthiyah discovered a way to hack any Facebook Business Page with a simple trick. Look…

10 years ago

CERT warns of hard-coded credentials in home routers

DSL home routers from a number of vendors contain hard-coded credentials that could allow a hacker to hijack the network…

10 years ago

GitHub Again Hit by a new DDoS attack

GitHubhit by another major DDoS attack to because Chinese developers have been forced by police to remove projects of tools…

10 years ago

PayPal critical Flaw allows to steal all your funds

The expert Ebrahim Hegazy discovered a critical Stored XSS Vulnerability Paypal Critical Vulnerability to steal Users Credit Cards in ClearText…

10 years ago

Be aware enterprises, it’s time to block Tor network

A research conducted by the IBM X-Force team reveals that a growing number of cyber attacks against big IT enterprises…

10 years ago

Sphinx, a new variant of Zeus available for sale in the underground

A new variant of the popular Zeus banking trojan dubbed was Sphinx is appeared for sale on the black market,…

10 years ago

SysAdmin admin tool AutoIt used in targeted attacks to serve malware

Security experts at Cisco have uncovered a targeted attack leveraging on AutoIt to serve a RAT and other malware by…

10 years ago

The relentless ascent of DDoS attacks

The report Q2 2015 State of the Internet published by Akamai states that there has been a multiplying growth in…

10 years ago

Samsung smart fridge opens Gmail login to hack

At the recent DEF CON hacking conference penetration testers demonstrated that  Samsung smart fridge leaves Gmail logins open to attack.…

10 years ago

This website uses cookies.