New Tor Browser 7.0 implements multiprocess mode, content sandbox, and Unix domain sockets

9 years ago

The Tor Project Team has announced the release of Tor Browser 7.0, it comes with multiprocess mode, content sandbox, and…

Platinum hackers leverages Intel Active Management tools to bypass Windows firewall

9 years ago

The PLATINUM hacker group has developed a system leveraging Intel Active Management Technology (AMT) to bypass the Windows firewall. Microsoft…

Al-Jazeera claims to be facing a large-scale cyber attack due to Qatar crisis

9 years ago

Al-Jazeera claims to be the victim of a large-scale cyber attack as Qatar crisis continues. The attack comes after the…

F-Secure experts found multiple flaws in popular Chinese Internet-connected cameras

9 years ago

Experts at F-Secure discovered tens of vulnerabilities in tens of thousands of Internet-connected cameras from China-based manufacturer Foscam. Security experts…

Comey hearing: Former FBI director talks about Russia interference in US Presidential Election

9 years ago

Former FBI Director Comey hearing: Comey Has 'No Doubt' on the Russia's Involvement in cyber attacks against 2016 US Presidential…

A new Linux Malware targets Raspberry Pi devices to mine Cryptocurrency

9 years ago

Security researchers at Dr. Web discovered two new Linux Malware, one of them mines for cryptocurrency using Raspberry Pi Devices.…

Turla APT malware now retrieves C&C address from Instagram comments

9 years ago

A malicious code used by Turla APT in a recent campaign leverages comments posted to Instagram to obtain the address…

US intelligence officials believe Russian Hackers are behind the Qatar hack

9 years ago

US intelligence officials believe Russi-linked hackers are behind the Qatar hack and used false news to prompt a diplomatic crisis…

Russia-linked hacker group APT28 continues to target Montenegro

9 years ago

Once again, Montenegro was targeted by the Russia-linked hacker group APT28, according to the experts it is just the beginning.…

Exfiltrating data from Air-Gapped Networks via Router LEDs

9 years ago

A team of Israeli researchers has devised a new technique to exfiltrate data from a machine by using a malware…

This website uses cookies.