Hacking

Analyze VirusTotal Metadata to profile hackers

An independent researcher has analyzed for years the metadata on submissions to VirusTotal service identifying patterns related to many bad…

11 years ago

Alleged iCloud flaw exploited in Naked celebrity hack

Investigation on celebrities naked pictures leaked online raises suspicion that hackers breached iCloud accounts exploiting a flaw in the "Find…

11 years ago

How to discover Wi-Fi WPS password in one second with offline calculations

Dominique Bongard has presented an improvement to previous attack on WPS which allows to discover the PIN in just one…

11 years ago

Google Dorking is a threat to Gov sensitive data according to a Feds memo

FBI and National Counterterrorism Center issued a memo to warn Government agencies on the risks related to Google Dorking on…

11 years ago

Major cyber attacks hit 5 US banks including JPMorgan

US law enforcement and private security firms are investigating on a series of cyber attacks which hit JPMorgan and other…

11 years ago

A Wide Open Backdoor is present in million Netis Routers

Routers manufactured by Netcore and sold worldwide under Netis brand have a wide-open backdoor that can be fairly easily exploited…

11 years ago

An automated DDoS reflection attack tool used in the wild

A group of hackers dubbed DERP has created a super tool to coordinate multi protocol DDoS reflection attacks as explained…

11 years ago

A new Side channel attack-how to steal encryption keys by touching PCs

Researchers demonstrated a new side channel attack which allow them to steal encryption keys by simply touching a laptop. Yesterday…

11 years ago

Hacking Gmail mobile app with 92 percent success and many other applications

Researchers have developed a malware which exploits "a newly discovered public side channel" which allows the access to the shared memory…

11 years ago

Foreign hackers stole Flight MH370 data from investigators

The day after the crash of Malaysia Airlines Flight MH370 hackers stole classified data from the computers of senior officials…

11 years ago

This website uses cookies.