iPhone Apps you granted camera access can secretly take photos and record video

8 years ago

A serious privacy issue in iPhone that could be exploited by iOS app developers to silently take your photos and record…

New Dutch legal framework could cause Mozilla to take off the Dutch CA from its trust list.

8 years ago

Mozilla would remove the Dutch CA, the CA of the Staat de Nederlanden, from its trust list due to the new…

Industrial Products of many vendors still vulnerable to KRACK attack

8 years ago

Many industrial networking devices from various vendors are still vulnerable to the recently disclosed KRACK attack (Key Reinstallation Attack). Many industrial…

Hashcat 4.0.0 now can crack passwords and salts up to length 256

8 years ago

The new version of the tool, Hashcat 4.0.0 release is now available and includes the support to crack passwords and…

Matrix Ransomware being distributed through malvertising

8 years ago

Security expert Jérôme Segura from Malwarebytes has spotted that Matrix Ransomware has risen again, it is now being distributed through malvertising. Malware…

Security Affairs newsletter Round 134 – News of the week

8 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Once again…

IOActive disclosed 2 critical flaws in global satellite telecommunications Inmarsat’s SATCOM systems

8 years ago

Flaws in Stratos Global AmosConnect 8 PC-based SATCOM service impact thousands of customers worldwide running the newest version of the…

Basetools underground hacking forum breached, hacker demands $50K ransom

8 years ago

Basetools underground hacking forum was breached, hackers demand a $50K ransom to avoid sharing stolen data, including admin identity, with…

Mysterious hack allows attackers stealing Windows login credentials without user interaction

8 years ago

Microsoft fixed a vulnerability that could allow hackers to steal Windows login credentials without any user interaction. Microsoft fixed a…

Documents encrypted by Bad Rabbit ransomware could be recovered without paying ransom

8 years ago

Files Encrypted by Bad Rabbit Recoverable Without Paying Ransom. Some victims of the recent Bad Rabbit attack may be able…

This website uses cookies.