Security

Android malware uses Google Cloud Messaging Service as C&C Server

Security experts at Kaspersky have detected numerous Android malicious applications that uses Google Cloud Messaging Service as C&C. Android malware exploits the Google Cloud Messaging…

11 years ago

Android wallet apps vulnerability could allow currency theft

Bitcoin.org has released a security advisory related to a serious security flaw related to Android wallet apps that could allow…

11 years ago

AndroRAT drives the rise for DIY Android hacking tools

AndroRAT is just one of the numerous open-source tools that was created and published on the undergroud forums to allow…

11 years ago

Vulnerability in Windows Phone OS could allow information disclosure

Microsoft Security Advisory reveals a vulnerability in Windows Phone OS that could allow information disclosure Microsoft has issued a security advisory related to…

11 years ago

Chinese Comment Crew caught taking over a fake Water Plant

Chinese Hacking Team Comment Crew caught taking over a honeypot simulating a Water Plant, the infinite offensive of Chinese Cyber…

11 years ago

Facebook flaw allows the disclosure of Friends List

This POC demonstrates that exploiting a Facebook flaw it is possible the disclosure of Friends List EVEN WHEN HE HAS…

11 years ago

FBI Android malware used for investigations

Former FBI officers revealed to the Wall Street Journal the existence of FBI Android malware that is used to spy…

11 years ago

Syrian Electronic Army hacked White House employees personal emails

At least three White House employees personal Gmail accounts hacked by the popular group of hackers knows as Syrian Electronic…

11 years ago

Q2 2013 Superfecta report, constant increase for automated attacks

FireHost Secure cloud hosting company issued Q2 2013 Superfecta report that revealed a sharp increase in blended, automated attacks. FireHost announced the…

11 years ago

Credit Card Redirection, the evolution of phishing

Researchers at Securi discover Credit Card Redirection attack technique to hijack credit card data during transactions on e-commerce sites. With…

11 years ago

This website uses cookies.