Ops, hackers can exfiltrate data from air-gapped networks through a malware controlled via a scanner

9 years ago

A group of Israeli researchers has devised a new technique to exfiltrate data from a PC in an air-gapped network through malware controlled…

Security Affairs newsletter Round 108 – News of the week

9 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

What Is Metadata Retention, And How Do You Maintain Your Privacy?

9 years ago

As Australia's newly approved Data Retention law comes into effect, how does the law actually affect the average coutry internet…

Fake app hiding a SMSVova spyware went undetected for years in the Google Play Stores

9 years ago

Millions of users looking to get software updates have downloaded an app hiding a spyware called SMSVova through the official…

US Court sentenced Russian hacker Roman Seleznev to 27 years in jail for hacking

9 years ago

Roman Seleznev, the son of the prominent Russian Parliament member Valery Seleznev was sentenced to 27 years in jail for…

Chinese APTs targeted the South Korean THAAD anti-missile systems

9 years ago

According to researchers at FireEye, Chinese hackers targeted the South Korean Terminal High Altitude Area Defense (THAAD) missile system. According…

Hackers compromised thousands of Windows boxes using leaked NSA hack tools DOUBLEPULSAR and ETERNALBLUE

9 years ago

Security researcher warn of hackers compromised thousands of Windows boxes using leaked NSA hack tools DOUBLEPULSAR and ETERNALBLUE Security expert Dan…

WikiLeaks published the user guide for the CIA Weeping Angel, the Samsung Smart TV Hacking Tool

9 years ago

WikiLeaks published the user guide related to the hacking tool allegedly used by the CIA, code-named Weeping Angel, to hack…

The Stuxnet vulnerability is still one of the most exploited flaws in the wild by hackers

9 years ago

A new report published by Kaspersky confirms that Stuxnet exploits targeting a Windows Shell Vulnerability is still widely adopted by…

Anatomy of Cybercriminal Communications: Why do crooks prefer Skype

9 years ago

Security firm Flashpoint published an interesting paper titled, 'Cybercrime Economy: An Analysis of Cybercriminal Communication Strategies' about cybercriminal communications of threat…

This website uses cookies.