Hacking

Google Chrome users are vulnerable to sensitive data theft

Security experts at Identity Finder demonstrated that Google Chrome users are vulnerable to sensitive Data Theft because the browser stores…

12 years ago

Profession Hacker, it’s shortage for cyber experts

Hacker, a figure considered today one of the most precious professional by Government organizations, private businesses and intelligence agencies. It's…

12 years ago

The Hacker Academy – Password Cracking 101: Meet John the Ripper

The Hacker Academy provides a unique learning experience, teaching infosec from the hacker’s perspective. Password cracking is one of the…

12 years ago

A backdoor present in many D-Link devices allows to bypass authentication

Researcher Craig published an interesting blog post on "/dev/ttyS0" on the reverse engineering of the backdoor present in many D-Link devices.…

12 years ago

KDMS Team hacked also ESET and BitDefender. Th3 J35t3r has found them

A pro-Palestinian group of hacktivists known as KDMS Team hacked also the two popular antivirus vendors Bitdefender and ESET. Th3…

12 years ago

NSA FOXACID servers used to drive the hack into target systems

NSA leaked documents reveals the existence of FOXACID servers that provides an automated hacking platform used to drive operators into…

12 years ago

Serious WhatsApp flaw allows decrypting user messages

A serious vulnerability in WhatsApp allows anyone who is able to eavesdrop on WhatsApp connection to decrypt users' messages. A…

12 years ago

Blackhole author arrested. The impact on the underground market

The author of the Blackhole exploits kit has been arrested after a long investigation. What will change in the offer…

12 years ago

How to exploit iFramed based traffic E-shop for illegal activities

What is an E-shop for iFramed traffic and how does cybercrime exploit it? In this post thanks to the investigation of the incredible…

12 years ago

New iOS 7 flaw allows attacker to hijack Apple ID through spoofing fingerprints

German firm SRL has found another serious security issue in iOS 7 that allows an attacker to access the iPhone and potentially…

12 years ago

This website uses cookies.