Hacking

Hacking satellite communications equipment on passenger jets

Cyber security expert claims to be able access satellite communications equipment on passenger jets through their WiFi and in-flight entertainment…

12 years ago

Tens of thousands of Mozilla developers emails and password exposed

Mozilla Security Team announced the accidental disclosure of MDN email addresses of about 76,000 users and encrypted passwords of about…

12 years ago

OpSaveGaza , Anonymous paralized Mossad website with a DDoS

Members of the group of hacktivists Anonymous have coordinated a major Distributed Denial of Service attack early this morning as…

12 years ago

Hackers can exploit USB devices to trigger undetectable attacks

A popular security researcher revealed that bad actors can tap into USB Devices to conduct attacks non detectable with known…

12 years ago

Zero-day flaws affect Symantec Endpoint Protection

Pen Testers at Offensive Security discovered Zero-day flaws in Symantec Endpoint Protection that could be exploited to gain full system…

12 years ago

Discovered attacks to compromise TOR Network and De-Anonymize users

On July 4 2014 Tor Team discovered a group of malicious relays that they assume were trying to deanonymize Tor…

12 years ago

Serious security issues affect 14 of 17 major antivirus engines

Joxean Koret, a security researcher at Singapore-based consultancy COSEINC, has publicly revealed a series of flaws which affect major antivirus…

12 years ago

Millions of Android devices exposed to fake ID flaw

Android devices are affected by a critical vulnerability which allows a malicious app to impersonate a trusted application inheriting its…

12 years ago

seL4, Hack-proof DARPA-derived micro kernel goes open source tomorrow

DARPA-derived secure micro kernel seL4 goes open source tomorrow, it is the a first prototype mathematically proven and hacker-repelling software.…

12 years ago

Instagram Adroid App affected by account session Hijacking flaw

A security researcher disclosed a serious issue on Instagram’s Android Application which could be exploited by an attacker to impersonate…

12 years ago

This website uses cookies.