Security

A backdoor present in many D-Link devices allows to bypass authentication

Researcher Craig published an interesting blog post on "/dev/ttyS0" on the reverse engineering of the backdoor present in many D-Link devices.…

12 years ago

KDMS Team hacked also ESET and BitDefender. Th3 J35t3r has found them

A pro-Palestinian group of hacktivists known as KDMS Team hacked also the two popular antivirus vendors Bitdefender and ESET. Th3…

12 years ago

NSA FOXACID servers used to drive the hack into target systems

NSA leaked documents reveals the existence of FOXACID servers that provides an automated hacking platform used to drive operators into…

12 years ago

Serious WhatsApp flaw allows decrypting user messages

A serious vulnerability in WhatsApp allows anyone who is able to eavesdrop on WhatsApp connection to decrypt users' messages. A…

12 years ago

Ponemon Institute issued the 2013 Cost of Cyber Crime Study

HP sponsored a study of Ponemon Institute that reveals Cost of Cybercrime in 2013 escalates 78 Percent while Time to…

12 years ago

Skorpion charger secure mobile while charging

Kaprica Security has presented the Skorpion charger, a smart device that is able to scan the handset for malware while…

12 years ago

Blackhole author arrested. The impact on the underground market

The author of the Blackhole exploits kit has been arrested after a long investigation. What will change in the offer…

12 years ago

2013 Norton Report, the impact of cybercrime according Symantec

Symantec issued 2013 Norton Report, the annual research study which examines the consumers’ online behaviors, the dangers and financial cost…

12 years ago

How to create undetectable malware with Mac encryption mechanism

Researcher Daniel Pistelli demonstrated how to exploit Mac internally encryption mechanism to create an undetectable Mac OS X Malware. During the…

12 years ago

New iOS 7 flaw allows attacker to hijack Apple ID through spoofing fingerprints

German firm SRL has found another serious security issue in iOS 7 that allows an attacker to access the iPhone and potentially…

12 years ago

This website uses cookies.