Hacking

Discovered a serious vulnerability in Mozilla Thunderbird

A serious vulnerability inside Mozilla Thunderbird Gecko engine allows hackers to insert malicious code into Emails to exploit recipient browser.…

12 years ago

Hackers used Spear Phishing attack to hack CNN Blogs

Security analysts at Intelligence firm InterCrawler published the details of the investigation on recent attack against CNN Blogs and social…

12 years ago

Israeli Defense computer hacked via spear phishing attack

Aviv Raff, CTO at Seculert, confirmed that the attackers have penetrated into the network of Israeli Defense accessing to 15…

12 years ago

Discovered a Remote Command Execution Vulnerability in Yahoo!

The cyber security expert Ebrahim Hegazy has found a Remote Code Execution vulnerability in a Yahoo server hosting numerous sub-domains.…

12 years ago

Spear phishing against Microsoft, exposed law enforcement inquiries

Attackers breached the email accounts of Microsoft staff, probably with a spear phishing attack, accessing to documents on law enforcement…

12 years ago

100 lines of code to Hack new Snapchat people verification

100 lines of code could hack new Snapchat people verification feature that displays nine images and requests new user to…

12 years ago

Google Chrome bug allows sites to listen users private conversations

Web developers Tal Ater discovered a Google Chrome Bug that allows websites to listen to user private conversations. Google still…

12 years ago

South Korea, 20 Million credit card data has been leaked

Financial Supervisory Service confirmed that Stolen credit card data of at least 20 million bank and credit card users in…

12 years ago

TeamBerserk announced a leaked of document data from DHS Fusion Center

Hackers from the group TeamBerserk announced to have leaked numerous sensitive documents from systems of some DHS Intelligence Fusion Centers.…

12 years ago

VPN vulnerability in Android devices allows intercept communications

Israeli Security researchers discovered an Android security flaw to bypass active VPN configurations and intercept secure communications. A new alleged…

12 years ago

This website uses cookies.