The professional social network LinkedIn is a mine of information for any king of attackers, a Websense post described…
Security expert Jay Freeman discovered another Master Key vulnerability in Android 4.4 that allows attackers to inject malicious code in…
Security Researcher Mohamed Osman Saeed has identified numerous vulnerabilities and reported them all, they include SQL Injection, XSS and URL…
Google Hacking is a formidable method for reconnaissance. Mass website hacking tools based on Google-dorks advantage the malicious online activities.…
OpNSA analyzed with OSINT techniques based on the correlation of media activities and physical protests. The analysts provided a…
Prolexic DDoS Attack Report reveals an increasing interest of cybercrime in Distributed Reflection Denial of Service technique, efficient and cost-effective.…
Security expert Ebrahim Hegazy has found another serious vulnerability in Twitter, he has discovered an Unrestricted File Upload Vulnerability. The…
Wi-Fi HTTP Request Hijacking attack against iOS - the researchers at Skycure have demonstrated a new technique that menaces mobile…
Exploring the Business Intelligence module proposed by the online course of the Hacker Academy - Intro to reconnaissance phase for…
The hack of a social media account is a common incident that could have a serious impact of our digital…
This website uses cookies.