Hacking

Profiling for underground service harvests mobile phone numbers

Dancho Danchev profiled a new service harvests mobile phone numbers advertised in the underground, the vendor also proposing SMS spamming…

12 years ago

Avira.com SQL Injection and Security Filter Bypassing

Cyber Security Analyst Ebrahim Hegazy has found an Avira.com SQL Injection vulnerability, Avira.com is the famous Avira Antivirus vendor's web…

12 years ago

DropBox account hacking bypassing two-factor authentication

Zouheir Abdallah revealed that a hacker already knows the victim's credentials for Dropbox account that has 2FA authentication enabled, is…

12 years ago

Android vulnerability makes 99% of mobile devices attackable

Bluebox Labs recently discovered an Android vulnerability in the OS's security model that allows hackers to attack 99% of Android…

12 years ago

Opera infrastructure hacked and digital certificate stolen

Opera software revealed that its infrastructure was attacked and a digital certificate has been stolen to sign malware and to…

12 years ago

Facebook hacked with an SMS, excellent the bug management

The hacker "fin1te"  revealed that Facebook account was hackable within a minute simply with an SMS. Excellent the bug management…

12 years ago

Car hacking, cinematographic fiction or reality

Car hacking is today possible due the massive introduction of technology in our vehicles, a hacker that gain access to…

12 years ago

Anonymous and state-sponsored hackers threaten energy sector

The energy sector is threaten with increasing frequency by hacktivists, state-sponsored hackers and cybercriminals... The number of cyber attacks against energy…

12 years ago

Raspberry Pi as physical backdoor to office networks

Network security engineer “Richee” explained how to use a Raspberry Pi to realize a physical backdoor to gain remote access to…

12 years ago

Webcam hacking exploits Chrome Inbuilt Flash player for Camjacking

Researcher Egor Homakov demonstrated the possibility of Webcam hacking exploiting Chrome Inbuilt Flash player, a flaw that represents a serious threat…

12 years ago

This website uses cookies.