Security

HORNET, the High-Speed Tor-Like encrypted anonymous network

A group of six academics has developed Hornet, a new high-speed anonymity network that promises to be a valid alternative…

11 years ago

Chrysler Recalls 1.4 Million Vehicles After Jeep Cherokee PoC Hack

Fiat Chrysler has recalled 1.4 million vehicles following security researchers hacked a Jeep Cherokee remotely by exploiting a vulnerability in…

11 years ago

All Smartwatches on the market are vulnerable to attacks

A study conducted by HP's Fortify on security features implemented by Smartwatches revealed that not even a single device found…

11 years ago

Exploit acquisition program terminated by Netragard

Netragard has shut down its exploit acquisition program, as a result of the clamorous data breach that the Italian firm…

11 years ago

OpenSSH Flaw exposes servers to brute-force attacks

A new critical vulnerability was discovered in the widely used OpenSSH software, hackers exploiting this flaw can run brute-force attacks…

11 years ago

Researcher discloses Local Privilege Escalation Flaw in Apple Mac OS X

Researchers have discovered a critical local privilege escalation (LPE) vulnerability in the Mac OS X operating system, but Apple will…

11 years ago

A new variant of Bartalex used to serve Dyre and Pony Trojans

Researchers have spotted a new strain of the Bartalex macro-based malware that is used to drop the Pony loader malware…

11 years ago

Business Blackout, economic impact of a cyber attack against a power grid

What will happen if hackers will hit critical infrastructure in the US, which will be the economic impact of a…

11 years ago

Joomla Helpdesk Pro flaws leave systems vulnerable to several attacks

The Outpost24 team has identified several vulnerabilities that affect Joomla HelpDesk Pro extension, the flaws can lead to remote code…

11 years ago

Facebook query packs detects Hacking Team malware on Mac OS X

Facebook releases query packs for finding possible malware infection, including the malicious exploits used by the Hacking Team to hack…

11 years ago

This website uses cookies.