Hacking

uIP and lwIP DNS resolver exposed to cache poisoning attacks

The DNS resolver implemented in the open source TCP/IP stacks uIP and lwIP is vulnerable to cache poisoning, the flaw…

11 years ago

China unveils laser defense system that could shoot down small drones in a few seconds

Chinese authorities unveil the development of a new highly accurate laser defense system that is able to shoot down small…

11 years ago

A security audit reveals that TextSecure app is vulnerable to Unknown Key-Share Attack

A group of researcher that audited the popular TextSecure Private Messenger app discovered that it is vulnerable to Unknown Key-Share…

11 years ago

ASUS Wireless Routers RT Series updates vulnerable to a Man in the Middle attack

The security expert David Longenecker discovered that the update process for ASUS Wireless Routers RT Series is vulnerable to Man-in-the-Middle…

11 years ago

Drupal community under attack due to a critical SQL injection flaw

A security advisory issued by Drupal assumes that every installation of the popular CMS based in the version 7.x was…

11 years ago

The Fappening part 6 is out … a boring saga

The part 6 of the Fappening archive is online, it includes image of Nicola Peltz, Krysten Ritter, Angie Miller, Aubrey…

11 years ago

Russian Tor exit node patches with malware the files downloaded

The researcher Josh Pitts of Leviathan Security Group identified a Russian Tor exit node that is patching the binaries downloaded…

11 years ago

Pangu Jailbreak Tool available for iOS 8 and iOS 8_1

The Chinese jailbreaking team Pangu has just released a software that allows Apple users to jailbreak their mobile devices using…

11 years ago

Hacking air gapped networks by using lasers and drones

A group of Israeli researchers has demonstrated at the last Black Hat Conference how to hack air gapped networks by…

11 years ago

US ICS-CERT testing medical devices for alleged flaws

The US Government is working with manufacturers and vendors of medical devices and equipment to identify and fix vulnerabilities. Every…

11 years ago

This website uses cookies.