Hacking

Pharming attacks exploit default passwords to hack routers

Experts at Proofpoint uncovered a pharming attack that uses phishing to exploit router vulnerabilities and carry out malicious activities. Security…

11 years ago

Joomla Reflection DDoS attacks exploit a Google Maps Plugin flaws

Akamai firm discovered numerous attacks exploiting a known vulnerability in a Google Maps plugin to run Joomla Reflection DDoS attacks…

11 years ago

More than 1 Million WordPress websites are vulnerable to blind SQL Injection Attacks

A security bug in the WordPress plugin WP-Slimstat could be exploited by attackers to discover a “secret” key and use…

11 years ago

The Europol and security giants dismantled the Ramnit botnet

The Ramnit botnet has been shut down in a joint effort by the Europol and the security firms Symantec, Microsoft,…

11 years ago

Lizard Squad run a DNS hijacking against the Google Vietnam website

Alleged Hacker belonging to the hacking crew Lizard Squad run a DNS hajacking attack against the Google Vietnam domain. A…

11 years ago

A critical remote execution flaw spotted in Samba Win-Linux interop code

CVE-2015-0240 is a critical security flaw in Samba that resides in the smbd file server daemon and can be exploited…

11 years ago

Samsung smartTVs don’t encrypt voice and text data

Samsung smartTV send unencrypted voice recognition data and text information across the Internet without encrypt it, allowing hackers to capture…

11 years ago

Rule 41 – Google against the expansion of FBI hacking powers

The Us Justice Department's proposal to grant FBI Rule 41 specific hacking rights is under high scrutiny. While the amendment is…

11 years ago

PowerSpy – How to spy on mobile users by monitoring the power supply

A group of researchers has proposed a new technique dubbed PowerSpy to track mobile users’ location by analyzing data related…

11 years ago

Verisign report – The rise of DDoS attacks as a service

A new report published by Verisign provides useful data related to the recent evolution of DDoS attacks and the services…

11 years ago

This website uses cookies.