Hacking

Yemen Cyber Army will release 1M of records per week to stop Saudi Attacks

Hackers of the Yemen Cyber Army (YCA) had dumped another 1,000,000 records obtained by violating systems at the Saudi Ministry…

10 years ago

Stegosploit hides malicious code in images, this is the future of online attacks

Stegosploit is the technique developed by the security researcher Saumil Shah that allows an attacker to embed executable JavaScript code…

10 years ago

1 in 20 Android apps open to attack due to a flaw in the Apache Cordova API Framework

Security researchers at Trend Micro Security firm discovered that 1 in 20 Android apps open to attack due to a…

10 years ago

Oracle PeopleSoft admin credentials open to hackers

SAP Security experts discovered a number of unpatched vulnerabilities and weaknesses in Oracle PeopleSoft that could be exploited to obtain…

10 years ago

Marauder’s Map allows Tracking Facebook Friends with a Chrome extension

Marauder’s Map is the name of a Chrome extension developed by Aran Khanna to simply track Facebook users using Facebook…

10 years ago

Linux-based Moose worm turns routers into social network bots

Linux/Moose is a malware family that targets Linux-based consumer routers turning them into social network bots to use for illegal…

10 years ago

A new iOS Bug Crashing iPhones by receiving a specific text message

A bug affecting the Messages app allows a string of characters sent to a person via iMessage or SMS to…

10 years ago

Iran has foiled a cyber attack against the oil ministry

Iran - The Cyber Attacks Emergency Center in FATA has thwarted a major cyber attack  originated from US against the…

10 years ago

A student hired hackers to attack schools of the West Ada school district

An Eagle High School student may be charged with a felony after being accused of a cyber attack on the…

10 years ago

Tracking wearable devices could be very easy via Bluetooth Low Energy

Researchers at Context Information Security have demonstrated that it is very easy to monitor IoT devices that implement the Bluetooth…

10 years ago

This website uses cookies.