Researcher Craig published an interesting blog post on "/dev/ttyS0" on the reverse engineering of the backdoor present in many D-Link devices.…
A pro-Palestinian group of hacktivists known as KDMS Team hacked also the two popular antivirus vendors Bitdefender and ESET. Th3…
NSA leaked documents reveals the existence of FOXACID servers that provides an automated hacking platform used to drive operators into…
A serious vulnerability in WhatsApp allows anyone who is able to eavesdrop on WhatsApp connection to decrypt users' messages. A…
HP sponsored a study of Ponemon Institute that reveals Cost of Cybercrime in 2013 escalates 78 Percent while Time to…
Kaprica Security has presented the Skorpion charger, a smart device that is able to scan the handset for malware while…
The author of the Blackhole exploits kit has been arrested after a long investigation. What will change in the offer…
Symantec issued 2013 Norton Report, the annual research study which examines the consumers’ online behaviors, the dangers and financial cost…
Researcher Daniel Pistelli demonstrated how to exploit Mac internally encryption mechanism to create an undetectable Mac OS X Malware. During the…
German firm SRL has found another serious security issue in iOS 7 that allows an attacker to access the iPhone and potentially…
This website uses cookies.