Hacking

Hacking air gapped networks by using lasers and drones

A group of Israeli researchers has demonstrated at the last Black Hat Conference how to hack air gapped networks by…

11 years ago

US ICS-CERT testing medical devices for alleged flaws

The US Government is working with manufacturers and vendors of medical devices and equipment to identify and fix vulnerabilities. Every…

11 years ago

NAT-PMP Protocol Vulnerability affects more than 1.2 Million SOHO devices

Security researchers at Rapid7 have discovered a serious NAT-PMP Protocol vulnerability that puts 1.2 Million SOHO routers at risk. Another…

11 years ago

Google improved 2-Step Verification with Security Key

Google has announced the introduction of an improved two-factor authentication mechanism based on a USB token dubbed Security Key. Google…

11 years ago

Operation Distributed Dragons, thousands of machine compromised worldwide

Operation Distributed Dragons - Tiger Security firm has discovered a series of DDoS attacks from China and that appear as…

11 years ago

Flaws in DTM components are threatening security of critical Industrial Control Systems

Researchers at the last Black Hat Europe have presented the results of their research on DTM/FDT components, demonstrating the presence…

11 years ago

Same Origin Method Execution attack to perform unintended actions on a website on behalf of victims

A researcher presented a new attack method dubbed Same Origin Method Execution which could be exploited to impersonate the targeted…

11 years ago

Security Companies united against the Hidden Lynx APT and its weapons

Principal security firms united in a joint effort dubbed Operation SMN against the cyber espionage group known as Hidden Lynx…

11 years ago

How to gain control of any Addthis user account

The security expert Federico Fazzi has disclosed a serious vulnerability in the Addthis.com service that allows attackers to take control…

11 years ago

Millions vulnerable UPnP devices vulnerable to attack

Researchers at Akamai firm have issued a report on reflection and amplification DDoS attacks exploiting vulnerable UPnP devices worldwide. Researchers…

11 years ago

This website uses cookies.