US Air Force Wireless hacking in Flight

9 years ago

The US Air Force is using a modified  EC-130 Compass Call aircraft to demonstrate how to hack into enemy networks.…

The Hacking crew known as Gaza cybergang was very active in Q2 2015

9 years ago

Security experts at Kaspersky have observed an increase in the activity of the group of hackers politically motivated known as…

Does Mr. Robot’s use real Hacking Tools? Which are?

9 years ago

Check out the hacking tools used by Mr. Robot and see why the display of these tools is as realistic…

Are you still using TrueCrypt? Beware of these 2 critical flaws!

9 years ago

The popular security expert James Forshaw has discovered two critical flaws in the driver that TrueCrypt installs on Windows systems.…

Linux XOR DDoS Botnet delivers potent DDoS attacks

9 years ago

Experts at Akamai discovered the Linux XOR DDoS Botnet,  a malicious infrastructure used to run potent DDoS attacks against dozens…

The Shopify commerce platform is open to RFD attacks

9 years ago

The researcher David Sopas at WebSegura discovered a Reflected Filename Download vulnerability in the popularmulti-channel commerce platform Shopify. Shopify is a…

Shifu banking trojan is officially spreading to the UK

9 years ago

The researchers at Security Intelligence announced that Shifu banking trojan is officially spreading to the UK targeting Banks and Wealth…

Mobile Ad Network exploited to run a major DDoS Attack

9 years ago

Security experts at CloudFlare observed a major DDoS attack against one of their customers that appeared to leverage a mobile…

How to use GCAT backdoor with Gmail as a C&C server

9 years ago

The GCAT backdoor is a fully featured backdoor which could be controlled by using Gmail as a Command & Control…

Tracking Hacker Forums with Traffic Analysis

9 years ago

A study conducted by the Intelligence firm RecordedFuture demonstrates the efficiency of the analysis of hacker forums through traffic analysis-like…

This website uses cookies.